Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Size: px
Start display at page:

Download "Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice."

Transcription

1

2

3 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2009 Trend Micro Incorporated. All rights reserved. Document Part No. ACEM14037/90306 Release Date: April 2009 Patents Pending

4 The Trend Micro Security for Macintosh user documentation contains product feature information, installation, deployment, and uninstallation instructions for your production environment. You should read the documentation prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro s Web site at: Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:

5 Contents Preface Chapter 1: Chapter 2: Chapter 3: Chapter 4: Trend Micro Security for Macintosh Documentation...vi Audience...vi Document Conventions...vii Introducing Trend Micro Security for Macintosh Introducing Trend Micro Security for Macintosh Features and Benefits Malware Protection Web Protection Logs Notifications Deploying Trend Micro Security for Macintosh System Requirements Pre-Installation Considerations Deploying Trend Micro Security for Macintosh Local Installation Post Installation Tasks Deploying Settings Deploying Settings Step 1: Configure Settings Step 2: Stop the Trend Micro Security for Macintosh Process Step 3: Copy Settings Step 4: Restart Endpoint Computers Uninstalling Trend Micro Security for Macintosh Uninstalling Trend Micro Security for Macintosh Using Apple Remote Desktop Local Uninstallation iii

6 Trend Micro Security for Macintosh Remote Deployment Guide Chapter 5: Chapter 6: Frequently Asked Questions Frequently Asked Questions Getting Support Contacting Technical Support Sending Infected File Samples Introducing TrendLabs Other Useful Resources Index iv

7 Preface Preface Welcome to the Trend Micro Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels. This chapter discusses the following topics: Trend Micro Security for Macintosh Documentation on page vi Audience on page vi Document Conventions on page vii v

8 Trend Micro Security for Macintosh Remote Deployment Guide Trend Micro Security for Macintosh Documentation The Trend Micro Security for Macintosh documentation consists of the following: Help Helps you configure product features through the user interface. You can access the help by opening the product console and then clicking the help icon. User s Guide Helps you plan for deployment and configure product settings. Remote Deployment Guide Helps you deploy product and configurations remotely Read Me File Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history. The product documents are available at: Audience Trend Micro Security for Macintosh documentation is written for IT managers and end-users. The documentation assumes that the reader has experience working with Apple Macintosh computers and has basic experience installing and using software applications for Macintosh computers. vi

9 Document Conventions To help you locate and interpret information easily, the Trend Micro Security for Macintosh documentation uses the following conventions. TABLE 2-1. Document Conventions CONVENTION ALL CAPITALS Bold Italics Monospace Note: DESCRIPTION ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY- BOARD Menus and menu commands, command buttons, tabs, options, and Trend Micro Security for Macintosh tasks References to other documentation Examples, sample command lines, program code, Web URL, file name, and program output Configuration notes Tip: Recommendations WARNING! Reminders on actions or configurations that should be avoided vii

10 Trend Micro Security for Macintosh Remote Deployment Guide viii

11 Chapter 1 Introducing Trend Micro Security for Macintosh This chapter introduces Trend Micro Security for Macintosh and provides a brief description of its components and a list of features and benefits. This chapter discusses the following topics: Introducing Trend Micro Security for Macintosh on page 1-2 Features and Benefits on page 1-3 Malware Protection on page 1-3 Web Protection on page 1-4 Logs on page 1-4 Notifications on page

12 Trend Micro Security for Macintosh Remote Deployment Guide Introducing Trend Micro Security for Macintosh Trend Micro Security for Macintosh is a security client designed specifically for Mac OS X. Trend Micro Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware. FIGURE 1-1 Trend Micro Security for Macintosh Protection Status screen 1-2

13 Introducing Trend Micro Security for Macintosh Features and Benefits Trend Micro Security for Macintosh provides the following features and benefits: Comprehensive Malware Protection Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge. Complete Web Protection Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings. Simple Installation Trend Micro Security for Macintosh provides a wizard-type installation program, tmsminstall.mpkg that allows users to install the product on a single computer. You can also use Apple Remote Desktop for easy installation on several computers. Easy to Use Product Console The Trend Micro Security for Macintosh product console provides quick access to the most commonly used security features and settings. Instant and Informative Notifications Configure Trend Micro Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end. Malware Protection Malware Protection provides three scan methods to protect users from malware. Enable Real-time Scan to have the Trend Micro Security for Macintosh scan for malware when opening, closing, saving, and downloading files. Scan for malware and other threats on demand with Manual Scan. Configure Scheduled Scan to scan for malware at regularly scheduled intervals. 1-3

14 Trend Micro Security for Macintosh Remote Deployment Guide Web Protection Web Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware. Logs To provide current information about the security of your computer, Trend Micro Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly. Notifications Configure Trend Micro Security for Macintosh to display notifications in response to program events and security events. Program events such as scans and updates, and security events such as malware detections, Web site violations, and Web threat detections. 1-4

15 Chapter 2 Deploying Trend Micro Security for Macintosh This chapter describes the requirements and process for deploying Trend Micro Security for Macintosh. This chapter also includes a list of post installation tasks. This chapter discusses the following topics: System Requirements on page 2-2 Pre-Installation Considerations on page 2-2 Deploying Trend Micro Security for Macintosh on page 2-3 Local Installation on page 2-6 Post Installation Tasks on page

16 Trend Micro Security for Macintosh Remote Deployment Guide System Requirements To run the Trend Micro Security for Macintosh, your computer must meet the following requirements: Hardware: Macintosh computer with PowerPC and Intel core processor 256MB RAM 100MB available hard disk space Software: Mac OS X version (Tiger) or higher Mac OS X version (Leopard) or higher Apple Remote Desktop The Trend Micro Security for Macintosh needs an Internet connection to perform the following tasks: Download product and component updates Obtain virus information Browse Web pages on the Trend Micro Web site. Pre-Installation Considerations To ensure a successful installation and operation of Trend Micro Security for Macintosh, check for and uninstall other installed antivirus and anti-spyware products before installing Trend Micro Security for Macintosh. Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation. 2-2

17 Deploying Trend Micro Security for Macintosh Deploying Trend Micro Security for Macintosh The process of installing Trend Micro Security for Macintosh on several computers can be simplified by using Apple Remote Desktop. To deploy Trend Micro Security for Macintosh to endpoint computers: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers to deploy to in Apple Remote Desktop. FIGURE 2-1 Remote Desktop screen 3. Click Install. The Install Packages screen appears. 2-3

18 Trend Micro Security for Macintosh Remote Deployment Guide 4. Drag the Trend Micro Security for Macintosh installer package on this screen. Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages. FIGURE 2-2 Install Packages screen 5. (Optional) Click Save to save this task for deployment to new machines installed in the network. 6. Click Install. The Remote Desktop starts installing the package to the selected endpoints. 2-4

19 Deploying Trend Micro Security for Macintosh 7. Verify that the installation was successful. The message Install Packages: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 2-3 Successful installation screen 2-5

20 Trend Micro Security for Macintosh Remote Deployment Guide Local Installation The process of installing Trend Micro Security for Macintosh on a single computer is similar to the installation process for other Macintosh software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. To install Trend Micro Security for Macintosh: 1. Uninstall other security software products. Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation. 2-6

21 Deploying Trend Micro Security for Macintosh 2. Double-click the Trend Micro Security for Macintosh Standalone-1.0.xxx.dmg file. The files included in the disk image appears. FIGURE 2-4 Trend Micro Security for Macintosh files included in the disk image 2-7

22 Trend Micro Security for Macintosh Remote Deployment Guide 3. Double-click the Install Trend Micro Security Standalone icon to launch the installation program. The confirmation message appears. FIGURE 2-5 Confirm installation popup 4. Click Continue. The Introduction screen appears. FIGURE 2-6 Introduction screen 2-8

23 Deploying Trend Micro Security for Macintosh 5. Click Continue. The Important Information screen appears. FIGURE 2-7 Important Information screen 6. Read the Read Me file. 2-9

24 Trend Micro Security for Macintosh Remote Deployment Guide 7. Click Continue. The Software License Agreement screen appears. 8. Read the License agreement. 9. Click Continue. The confirmation message appears. FIGURE 2-8 Continue installation popup 2-10

25 Deploying Trend Micro Security for Macintosh 10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears. 11. Click Agree. The Standard Install screen appears. FIGURE 2-9 Standard install screen 2-11

26 Trend Micro Security for Macintosh Remote Deployment Guide 12. Click Install to accept the default installation or click Change Install Location to select a different location. The password confirmation popup appears. FIGURE 2-10 Password confirmation popup 13. Type the Name and Password. Note: The name and password need to have the appropriate administrative credentials to continue with the installation. 2-12

27 Deploying Trend Micro Security for Macintosh 14. Click OK. The installation process begins. FIGURE 2-11 Installing Trend Micro Security screen 2-13

28 Trend Micro Security for Macintosh Remote Deployment Guide 15. If the installation is successful, the Installation completed successfully screen appears. FIGURE 2-12 Installation completed successfully screen 16. Click Close. Post Installation Tasks Immediately after installing Trend Micro Security for Macintosh, perform the following tasks to ensure that: the product is working the product has the newest components your computer is protected and free from malware and spyware/grayware 2-14

29 Deploying Trend Micro Security for Macintosh Perform the following tasks: 1. Access the Trend Micro Security for Macintosh product console. 2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection. 3. Check for Internet connectivity by opening a Web browser and try to access: 4. Update the product using Update Now. 5. Scan your computer for malware and spyware/grayware using Scan Now. 2-15

30 Trend Micro Security for Macintosh Remote Deployment Guide 2-16

31 Chapter 3 Deploying Settings This chapter describes how to deploy Trend Micro Security for Macintosh basic configuration settings to endpoint computers. This chapter discusses the following topics: Deploying Settings on page

32 Trend Micro Security for Macintosh Remote Deployment Guide Deploying Settings Individual settings can be modified from the administrator s computer and deployed to endpoint computers. Refer to the Trend Micro Security for Macintosh User s Guide for more information on these procedures. To deploy the settings: Step 1: Configure Settings on page 3-3 Step 2: Stop the Trend Micro Security for Macintosh Process on page 3-10 Step 3: Copy Settings on page 3-14 Step 4: Restart Endpoint Computers on page

33 Deploying Settings Step 1: Configure Settings Configure the baseline settings from the administrator s computer before deploying to endpoint computers. Refer to the Trend Micro Security for Macintosh User s Guide for more information on these settings. Configure the following settings from the administrator s computer for deployment: Note: Only these settings can be deployed to endpoint computers. Web Protection Web Threat Protection settings FIGURE 3-1 Web Threat Protection screen 3-3

34 Trend Micro Security for Macintosh Remote Deployment Guide Approved Websites FIGURE 3-2 Approved Websites screen 3-4

35 Deploying Settings Scan Settings Real-time Scan settings FIGURE 3-3 Real-time Scan settings screen 3-5

36 Trend Micro Security for Macintosh Remote Deployment Guide Manual Scan settings FIGURE 3-4 Manual Scan settings screen 3-6

37 Deploying Settings Scheduled Scan settings FIGURE 3-5 Scheduled Scan settings screen 3-7

38 Trend Micro Security for Macintosh Remote Deployment Guide Exception List FIGURE 3-6 Exception List screen 3-8

39 Deploying Settings Update settings AutoUpdate settings FIGURE 3-7 Auto Update screen 3-9

40 Trend Micro Security for Macintosh Remote Deployment Guide Proxy Settings FIGURE 3-8 Proxy Settings screen Step 2: Stop the Trend Micro Security for Macintosh Process Stop the Trend Micro Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop. To stop the Trend Micro Security for Macintosh process: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 3-10

41 Deploying Settings 2. Select the endpoint computers to deploy to in Apple Remote Desktop. FIGURE 3-9 Apple Remote Desktop screen 3. Click UNIX. The Send UNIX Command screen appears. 3-11

42 Trend Micro Security for Macintosh Remote Deployment Guide 4. Type the following UNIX command: sudo SystemStarter stop TmccCore FIGURE 3-10 The Send UNIX Command screen 5. Select User and type root under Run Command as. 6. (Optional) Click Save to save this command for deployment to new computers installed in the network. 3-12

43 Deploying Settings 7. Click Send. The Send UNIX Command processing request screen appears. FIGURE 3-11 Send UNIX Command processing request screen 3-13

44 Trend Micro Security for Macintosh Remote Deployment Guide 8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-12 Successfully stopped process screen Step 3: Copy Settings Copy the settings from the administrator s computer to the endpoint computers using Apple Remote Desktop. To copy the settings: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers to deploy to in Apple Remote Desktop. 3-14

45 Deploying Settings 3. Click Copy. The Copy Items screen appears. FIGURE 3-13 The Copy Items screen 4. Select the tmcccore.conf.plist and tmccmac.com.plist files from the.../library/application Support/TrendMicro/common/conf folder. 5. Select Same relative location beside Place items in. 6. Select Replace the item beside If an item already exists. 7. Select Inherit from destination folder beside Set item ownership to. 3-15

46 Trend Micro Security for Macintosh Remote Deployment Guide 8. (Optional) Click Save to save this command for deployment to new machines installed in the network. 9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer. 10. Verify that the setting deployment was successful. The Copy Items: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-14 Successfully copied items screen Step 4: Restart Endpoint Computers Restart endpoint computers to ensure that the settings have been deployed. To restart endpoint computers: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 3-16

47 Deploying Settings 2. Select Manage from the Apple Remote Desktop application menu. FIGURE 3-15 Apple Remote Desktop application menu 3-17

48 Trend Micro Security for Macintosh Remote Deployment Guide 3. Select Restart. The Restart Computers screen appears. FIGURE 3-16 Restart Computers screen 4. Select the endpoint computers to restart. 5. Click Restart. Apple Remote Desktop remotely restarts endpoint computers. 3-18

49 Deploying Settings 6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-17 Restart Computers: Succeeded screen 3-19

50 Trend Micro Security for Macintosh Remote Deployment Guide 3-20

51 Chapter 4 Uninstalling Trend Micro Security for Macintosh This chapter describes the Trend Micro Security for Macintosh uninstallation. This chapter discusses the following topics: Uninstalling Trend Micro Security for Macintosh on page

52 Trend Micro Security for Macintosh Remote Deployment Guide Uninstalling Trend Micro Security for Macintosh The process of uninstalling Trend Micro Security for Macintosh is similar to the uninstallation process for other Macintosh software. There are two ways to uninstall Trend Micro Security for Macintosh: Using Apple Remote Desktop Uninstalling manually from the local machine Using Apple Remote Desktop Use this process to uninstall remotely from one or several computers. To uninstall using Apple Remote Desktop: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers for uninstallation. 4-2

53 Uninstalling Trend Micro Security for Macintosh 3. Click UNIX. The Send UNIX Command screen opens. FIGURE 4-1 Remote Desktop screen 4-3

54 Trend Micro Security for Macintosh Remote Deployment Guide 4. Type the following UNIX command: /Library/Application\ Support/TrendMicro/uninstall/uninstall.sh FIGURE 4-2 Send UNIX Command screen 5. Select User and type root under Run Command as. 6. (Optional) Click Save to save this command for deployment to computers in the network. 4-4

55 Uninstalling Trend Micro Security for Macintosh 7. Click Send. The Send UNIX Command processing request screen appears. FIGURE 4-3 Processing computer uninstallation screen 4-5

56 Trend Micro Security for Macintosh Remote Deployment Guide 8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected endpoints. FIGURE 4-4 Successfully uninstalled program screen 4-6

57 Uninstalling Trend Micro Security for Macintosh Local Uninstallation Use this process to uninstall from a single computer in the network. To manually uninstall Trend Micro Security for Macintosh: 1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears. FIGURE 4-5 Trend Micro Security for Macintosh files included in the disk image 4-7

58 Trend Micro Security for Macintosh Remote Deployment Guide 2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears. FIGURE 4-6 Confirm uninstallation popup 3. Click Uninstall. The password confirmation popup appears. FIGURE 4-7 Password confirmation popup 4. Type the Name and Password. Note: The name and password need to have the appropriate administrative credentials to continue with the uninstallation. 4-8

59 Uninstalling Trend Micro Security for Macintosh 5. Click OK. The uninstallation process begins. FIGURE 4-8 Uninstalling Trend Micro Security screen 6. If uninstallation is successful, an Uninstallation Completed screen will appear. FIGURE 4-9 Uninstallation completed screen 7. Click OK. 4-9

60 Trend Micro Security for Macintosh Remote Deployment Guide 4-10

61 Chapter 5 Frequently Asked Questions This chapter presents and answers frequently asked questions about Trend Micro Security for Macintosh. This chapter discusses the following topics: Frequently Asked Questions on page

62 Trend Micro Security for Macintosh Remote Deployment Guide Frequently Asked Questions Installation Why do I receive a warning when I install Trend Micro Security for Macintosh on OS X version or or lower? Trend Micro Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard). If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend Micro Security for Macintosh on a version of Tiger lower than If you are using the Leopard version of the Mac OS X (10.5), you can install Trend Micro Security for Macintosh on versions of Leopard that are less than However, Trend Micro Security for Macintosh will issue a warning. Tip: Trend Micro recommends using the latest version of the Mac operating system. Uninstallation Why does no popup window appear when I try to uninstall Trend Micro Security for Macintosh? When you attempt to uninstall Trend Micro Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your administrator credentials anytime within the previous 5 minutes, Trend Micro Security for Macintosh will remember them and the uninstallation program will not require you to provide the credentials again. What do I do if I receive an uninstall failed message? 1. Restart your computer. 2. Reinstall Trend Micro Security for Macintosh. 3. Use the uninstall tool to uninstall Trend Micro Security for Macintosh. 5-2

63 Frequently Asked Questions Compatibility What do I do if my computer performance decreases after installing Trend Micro Security for Macintosh? Check if there are other antivirus products installed on your computer. Some antivirus products are not compatible with Trend Micro Security for Macintosh. To determine if Trend Micro Security for Macintosh is causing the performance problem, use the Activity Monitor to identify and close applications that display high resource usage. If the problem persists after closing the other applications, contact your support provider. 5-3

64 Trend Micro Security for Macintosh Remote Deployment Guide 5-4

65 Chapter 6 Getting Support Trend Micro is committed to providing service and support that exceeds our users expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support. This chapter discusses the following topics: Contacting Technical Support on page 6-2 Sending Infected File Samples on page 6-3 Introducing TrendLabs on page 6-3 Other Useful Resources on page

66 Trend Micro Security for Macintosh Remote Deployment Guide Contacting Technical Support Before contacting technical support, here are two things you can quickly do to try and find a solution to your questions: Check your documentation: the FAQ section of this User s Guide and Online Help provide comprehensive information about Trend Micro Security for Macintosh. Search both documents to see if they contain your solution. Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro products The support Web site has answers to previous user inquiries. To search the Knowledge Base, visit In addition to phone support, Trend Micro provides the following resources: support support@trendmicro.com Readme: late-breaking product news, installation instructions, known issues, and version specific information Product updates and patches To locate the Trend Micro office nearest you, open a Web browser to the following URL: To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can: Version Exact text of the error message, if any Steps to reproduce the problem 6-2

67 Getting Support Sending Infected File Samples You can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address: Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain. Introducing TrendLabs Trend Micro TrendLabs SM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world. Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world. For more information about TrendLabs, please visit: 6-3

68 Trend Micro Security for Macintosh Remote Deployment Guide Other Useful Resources Trend Micro offers a host of services through its Web site, Internet-based tools and services include: Virus Map: monitors virus incidents around the world Virus risk assessment: the Trend Micro online virus protection assessment program for corporate networks 6-4

69 Index A Apple Remote Desktop 2-3, 3-10, 4-2 Audience vi B Baseline settings 3-3 C Copy Items 3-15 Copy Settings 3-14 D Deployment 2-3 DMG Image 2-6 Document document conventions vii Document Conventions vii Document Feedback 1-ii Documentation audience vi F FAQs 5-2 Compatibility 5-3 Installation 5-2 Uninstallation 5-2 Features and Benefits 1-3 Feedback 1-ii H Help Icon vi I Installation dmg image 2-6 local 2-6 manual 2-6 post installation 2-14 pre-installation 2-2 remote 2-3 success 2-5 Installation Program 2-8 Interface protection status 1-2 L License Agreement 2-10 Logs 1-4 M Malware Protection 1-3 N Notifications 1-4 P Post Installation Tasks 2-14 Pre-installation Considerations 2-2 R Remote Desktop 2-3, 3-10, 4-2 Restart 3-16 S Send UNIX Command 3-11 Software License Agreement 2-10 System Requirements about 2-2 hardware 2-2 software 2-2 T Tmcccore.conf.plist 3-15 Tmccmac.com.plist 3-15 Trademarks 1-i U Uninstallation local 4-7 manual 4-7 remote 4-2 UNIX Command 3-12, 4-4 W Web Protection 1-4 IN 1

70 Trend Micro Security for Macintosh Remote Deployment Guide IN 2

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Trend Micro Email Encryption Gateway 5

Trend Micro Email Encryption Gateway 5 Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM

License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X September 2015 VERALAB TM License Patrol Client Installation Guide, 7.0 for Mac OS X. Copyright 2015 VeraLab Inc. All rights reserved. The

More information

Worry-Free TM Remote Manager TM 1

Worry-Free TM Remote Manager TM 1 Worry-Free TM Remote Manager TM 1 for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com/en-us/home.aspx

http://docs.trendmicro.com/en-us/home.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Home Network Security Services

Home Network Security Services Home Network Security Services Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software,

More information

for Small and Medium Business Quick Start Guide

for Small and Medium Business Quick Start Guide for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using

More information

Quick Start Guide. www. K7Computing.com

Quick Start Guide. www. K7Computing.com Quick Start Guide Table of Contents Before you install the Product... 3 Installing the program... 3 Quick Installation... 4 Custom Installation... 4 Installation... 7 Activation... 8 Offline Activation...

More information

Core Protection Module 1.6 for Mac powered by. User s Guide

Core Protection Module 1.6 for Mac powered by. User s Guide Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are

More information

Trend Micro Antivirus for Mac 2016

Trend Micro Antivirus for Mac 2016 H Trend Micro Antivirus for Mac 2016 Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Client Server Security3

Client Server Security3 Client Server Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Client Server Messaging Security3

Client Server Messaging Security3 Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

TREND MICRO. InterScan VirusWall 6. Getting Started Guide. Integrated virus and spam protection for your Internet gateway.

TREND MICRO. InterScan VirusWall 6. Getting Started Guide. Integrated virus and spam protection for your Internet gateway. TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM Getting Started Guide Trend Micro Incorporated reserves the right to make changes

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme

More information

Antivirus. Quick Start Guide. Antivirus

Antivirus. Quick Start Guide. Antivirus Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

Sophos Anti-Virus for Mac OS X network startup guide. For networked Macs running Mac OS X

Sophos Anti-Virus for Mac OS X network startup guide. For networked Macs running Mac OS X Sophos Anti-Virus for Mac OS X network startup guide For networked Macs running Mac OS X Product version: 7.0 Document date: May 2009 Contents 1 About this guide...3 2 System requirements...4 3 Protecting

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

McAfee Endpoint Security 10.0.0 Software

McAfee Endpoint Security 10.0.0 Software Installation Guide McAfee Endpoint Security 10.0.0 Software For use with epolicy Orchestrator 5.1.1 5.2.0 software and the McAfee SecurityCenter COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS Table of Contents A. Installing Symantec Anti-Virus 8.1 For Windows (32-Bit) From CD B. Installing Norton Anti-Virus 7.61 For Windows 95 From CD C. Installing Norton Anti-Virus

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Parallels Transporter Agent

Parallels Transporter Agent Parallels Transporter Agent User's Guide Copyright 1999-2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Education Software Installer 2014

Education Software Installer 2014 Education Software Installer 2014 SYSTEM ADMINISTRATOR S GUIDE FOR MAC OS X OPERATING SYSTEM SOFTWARE Product registration If you register your SMART product, we ll notify you of new features and software

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Installing Packaged Software

Installing Packaged Software Installing Packaged Software Software and Computer Systems Company, LLC June 2013 1 Installing and Removing Packages Supporting Hardware and Operating Systems At present (June 2013) all SCSC products support

More information

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me

McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 4.5.1 Installation & Configuration For Windows 98 and Me McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 4.5.1: Installation &

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial

Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Symantec Norton AntiVirus 9.0.1 for Macintosh Download, Installation, and Basic Use Tutorial Created by: Melanie Cofield Based on information found at: https://www.utexas.edu/its/bevoware/virus/macxvirus.html

More information

http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx

http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the cloud service described herein without notice. Before installing and using the cloud service, review the readme files,

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

Verizon Internet Security Suite Powered by McAfee User Guide

Verizon Internet Security Suite Powered by McAfee User Guide Verizon Internet Security Suite Powered by McAfee User Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

TREND MICRO. ServerProtect5. Comprehensive server and storage virus protection. For Network Appliance. Filers

TREND MICRO. ServerProtect5. Comprehensive server and storage virus protection. For Network Appliance. Filers ServerProtect5 TM TREND MICRO Comprehensive server and storage virus protection TM For Network Appliance Filers TM Trend Micro Incorporated reserves the right to make changes to this document and to the

More information

Sophos Anti-Virus for Mac OS X network startup guide

Sophos Anti-Virus for Mac OS X network startup guide Sophos Anti-Virus for Mac OS X network startup guide For networked Macs running Mac OS X Product version: 8.0 Document date: April 2012 Contents 1 About this guide...3 2 System requirements...4 3 Protecting

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Setting up FileMaker 10 Server

Setting up FileMaker 10 Server Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide 8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud Administrator s Guide Installation and Upgrade Guide Trend Micro Incorporated reserves the right to make

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Intego Enterprise Software Deployment Guide

Intego Enterprise Software Deployment Guide Intego Enterprise Software Deployment Guide www.intego.com Intego Enterprise Software Deployment Guide! Page 1 Table of Contents Introduction!... 3 Managing Macs in the Enterprise!... 4 Using Remote Management

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

TIBCO Hawk SNMP Adapter Installation

TIBCO Hawk SNMP Adapter Installation TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

Parallels Virtual Automation 6.1

Parallels Virtual Automation 6.1 Parallels Virtual Automation 6.1 Installation Guide for Windows April 08, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. c/o Parallels

More information

Administering Parallels Desktop 7 for Mac with the Casper Suite. Technical Paper November 2012

Administering Parallels Desktop 7 for Mac with the Casper Suite. Technical Paper November 2012 Administering Parallels Desktop 7 for Mac with the Casper Suite Technical Paper November 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Anti-Spyware Enterprise Module software

Anti-Spyware Enterprise Module software Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that

More information

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0 Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business OfficeScan TM Client/Server Edition 8 for Enterprise and Medium Business TM TM for Windows Vista Installation and Deployment Guide es Endpoint Security Trend Micro Incorporated reserves the right to make

More information

Connecting to Remote Desktop Windows Users

Connecting to Remote Desktop Windows Users Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Bitdefender Antivirus for Mac User's Guide

Bitdefender Antivirus for Mac User's Guide USER'S GUIDE Bitdefender Antivirus for Mac User's Guide Publication date 2015.09.10 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

for Small and Medium Business Getting Started Guide for Resellers

for Small and Medium Business Getting Started Guide for Resellers for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice.

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information