Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Similar documents


Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Sophos for Microsoft SharePoint startup guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Android App User Guide

Full Disk Encryption Agent Reference

Send technical support questions to In the United States, call the technical support team toll-free at TMSS

Global VPN Client Getting Started Guide

Software License Registration Guide

How To Manage Your Quarantine On A Blackberry.Com

User Guide Novell iprint 1.1 March 2015

Symantec Mail Security for Domino

Exchange 2003 Mailboxes

Hosting Users Guide 2011

Guide to Installing BBL Crystal MIND on Windows 7

Accounts Production Installation Guide

System Planning, Deployment, and Best Practices Guide

Sophos for Microsoft SharePoint Help

ez Agent Administrator s Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

ViRobot Desktop 5.5. User s Guide

Lab 05: Deploying Microsoft Office Web Apps Server

LifeSize Control Installation Guide

Barracuda Spam Firewall User s Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

Administrator's Guide

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

WatchDox for Windows User Guide. Version 3.9.0

WhatsUp Gold v16.2 Installation and Configuration Guide

Configuration Information

Asset Inventory Reference

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Core Protection for Virtual Machines 1

VMware Mirage Web Manager Guide

Copyright 2012 Trend Micro Incorporated. All rights reserved.

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT

File Management Utility User Guide

Cyber Security: Software Security and Hard Drive Encryption

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Archive Add-in Administrator Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ESET Mobile Security Business Edition for Windows Mobile

WatchDox for Mac User Guide

Release 2.0. Cox Business Online Backup Quick Start Guide

SecuraLive ULTIMATE SECURITY

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Worry-Free TM Remote Manager

Sage 200 Web Time & Expenses Guide

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

For Active Directory Installation Guide

Airtel PC Secure Trouble Shooting Guide

Trend Micro Hosted Security. Best Practice Guide

Ajera 7 Installation Guide

Net Protector Admin Console

Barracuda Spam & Virus Firewall User's Guide 5.x

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

Sophos Anti-Virus for NetApp Storage Systems startup guide

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

WatchDox Administrator's Guide. Application Version 3.7.5

HDDtoGO. User Guide. User Manual Version CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

Trend Micro OfficeScan Best Practice Guide for Malware

Technical Brief for Windows Home Server Remote Access

Installation and Configuration Guide

Configuration Information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Contents. VPN Instructions. VPN Instructions... 1

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

Maintaining the Content Server

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Clickfree Software User Guide

How To Use Secureanything On A Mac Or Ipad (For A Mac)


Sophos for Microsoft SharePoint Help. Product version: 2.0

SSL Management Reference

ATT8367-Novell GroupWise 2014 and the Directory Labs

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Troubleshooting File and Printer Sharing in Microsoft Windows XP

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Pentagon Message Exchange Setup Guide: All Devices

Novell ZENworks 10 Configuration Management SP3

StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

Installation and Program Essentials

Generating an Apple Push Notification Service Certificate

Setup and Configuration Guide for Pathways Mobile Estimating

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...


PCRecruiter Resume Inhaler

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

Novell SUSE Linux Enterprise Virtual Machine Driver Pack

Best Practice Configurations for OfficeScan (OSCE) 10.6

JetAdvice Manager Data Collector v Date:

User Guide Online Backup

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable user documentation, which is available from the Help button at the top right of the screens. Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2010-2012 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Document part No. TPEM15314/120113 Release date: April 2012 Document Version No.: 3.00

The user documentation for Trend Micro Portable Security introduces the main features of the software and installation instructions for your production environment. Read through it before installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at the Trend Micro Web site. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp

Contents Chapter 1: Introduction About Trend Micro Portable Security... 1-2 Process Overview... 1-3 Management Program... 1-4 Scanning Tool (USB drive)... 1-5 Chapter 2: Installation Installing the Management Program... 2-2 Chapter 3: Using the Management Program Getting Updates and Renewing Your Subscription... 3-2 Checking the Security Pattern File Version Number... 3-3 Editing the Activation Code... 3-3 Configuring the Scanning Tool... 3-5 Activating the Scanning Tool... 3-5 Synchronizing Settings with the Scanning Tool... 3-6 Changing the Name of the Scanning Tool... 3-7 Importing Log Data from a Scanning Tool... 3-7 Upgrading the Scanning Tool... 3-7 Configuring Scan Settings... 3-7 Configuring Settings For Target Computers... 3-10 Configuring Exclusion List Settings... 3-12 1-1

Trend Micro Portable Security 1.5 User Guide Managing Log Data...3-13 Configuring a Proxy Server...3-16 Removing the Scanning Tool...3-17 Upgrading...3-18 Chapter 4: Using the Scanning Tool Getting Started...4-2 Checking the Scan Results...4-4 Checking the Scan History...4-7 Checking the Version of the Pattern File and Scan Engine...4-8 Chapter 5: Using the Diagnostic Toolkit Using the Trend Micro Portable Security Diagnostic Toolkit...5-2 Moving Back Files...5-2 Logging Issues with Trend Micro Portable Security...5-5 Upgrading the Device...5-7 Chapter 6: Uninstallation Uninstalling Trend Micro Portable Security...6-2 Chapter 7: Getting Help Frequently Asked Questions (FAQs)...7-2 Technical Support...7-2 1-2

Chapter 1 Introduction Trend Micro Portable Security delivers high-performance, cost-effective security services, helping protect businesses against security threats. Topics in this chapter: About Trend Micro Portable Security on page 1-2 Process Overview on page 1-3 1-1

Trend Micro Portable Security 1.5 User Guide About Trend Micro Portable Security With Trend Micro Portable Security, you can use a "Scanning Tool" USB drive to find and remove security threats from computers that do not have security software or an Internet connection. You can also easily manage all of the log data generated by scans. 1-2

Introduction Process Overview Trend Micro Portable Security consists of a Management Program and a Scanning Tool. This overview shows how you can use both to help protect other computers. FIGURE 1-1. Overview of how Trend Micro Portable Security works 1-3

Trend Micro Portable Security 1.5 User Guide Note: You cannot use the Scanning Tool to scan the computer where the Management Program is installed. Protect this computer with a security software such as Trend Micro OfficeScan. While scanning for security threats, Trend Micro Portable Security may create temporary files on the computer. These files will be deleted after scanning. You can also choose to scan computers without saving the temporary files, refer to More settings on page 3-9. Management Program You can use the Management Program to perform these tasks: Download security pattern file and scan engine components Change the scan settings and synchronize them with the Scanning Tool Exclude files, folders, and extensions from scanning Import and manage log data generated by scans Specify an administrator account and password to enable scanning computers without administrator privileges 1-4

Introduction The Management Program can configure scan settings for and import log data from multiple Scanning Tools. To download pattern file and scan engine updates, you must install the Management Program on a computer with access to the Internet. FIGURE 1-2. Main screen of the Management Program Scanning Tool (USB drive) Once connected to a computer, the Scanning Tool can check it for security threats. The Scanning Tool can also fix, quarantine, or just log the threats found. The results of each scan are saved on the Scanning Tool. The Scanning Tool will display the following window on a computer that you want to check after you connect the USB. If the Scanning Tool does not start, you can open Windows Explorer and double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. 1-5

Trend Micro Portable Security 1.5 User Guide FIGURE 1-3. The Scanning Tool screen FIGURE 1-4. The Scanning Tool screen (If the scan finds a security threat) 1-6

Introduction Note: Unlike regular USB drives, you cannot use the Scanning Tool to store files. However, you can store quarantined files on it, instead of on the target computer. You must activate the Scanning Tool with the Management Program before using it. Refer to Activating the Scanning Tool on page 3-5 for more information. 1-7

Trend Micro Portable Security 1.5 User Guide 1-8

Chapter 2 Installation This chapter describes Trend Micro Portable Security Management Program installation procedures. Topics in this chapter: Installing the Management Program on page 2-2 2-1

Trend Micro Portable Security 1.5 User Guide Installing the Management Program To install the Management Program, you must log onto the computer using an account with Administrator privileges. To upgrade, please refer to Upgrading on page 3-18. Note: You must install the Management Program on a computer with access to the Internet. To install the Management Program: 1. Connect the Scanning Tool USB drive to the computer where you want to install the Management Program. 2. When a window opens, click Open folder. Tip: If the window does not appear, double-click the My Computer icon and open the TMPS drive. 3. Open the MP folder in the TMPS drive, and double-click the Setup.exe file. For example, TMPS(F):\MP\Setup.exe. Note: The drive letter may be different. 2-2

Installation 4. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 2-1. License Agreement screen 2-3

Trend Micro Portable Security 1.5 User Guide 5. When the Select Location window opens, you can select a different folder, or click Next. Tip: To install the program in a different location, click Browse and select a folder. FIGURE 2-2. Select Location screen 2-4

Installation 6. When the Activation Code window appears, type your activation code, and then click Next. FIGURE 2-3. Activation Code screen 7. When the Installation Finished window appears, click Close. If you marked the Open the Management Console now checkbox, the Management Program will open so that you can adjust your settings. Note: To remove the Scanning Tool without adjusting the Management Program settings, follow the instructions under Removing the Scanning Tool on page 3-17. 2-5

Trend Micro Portable Security 1.5 User Guide 2-6

Chapter 3 Using the Management Program This chapter describes how to use and configure the Trend Micro Portable Security Management Program. Topics in this chapter: Getting Updates and Renewing Your Subscription on page 3-2 Configuring the Scanning Tool on page 3-5 Managing Log Data on page 3-13 Configuring a Proxy Server on page 3-16 Removing the Scanning Tool on page 3-17 Upgrading on page 3-18 3-1

Trend Micro Portable Security 1.5 User Guide Getting Updates and Renewing Your Subscription Use the Overview tab to do the following: Download the latest security pattern file or scan engine updates Change the update settings Change your activation code Confirm the expiration date of your subscription FIGURE 3-1. Overview tab 3-2

Using the Management Program Checking the Security Pattern File Version Number The version number of the most recent security pattern file downloaded by Trend Micro Portable Security appears next to Virus Pattern. Click the version number link to see more details about each component and the date of the last update. Update Now Click Update Now to download the most recent security pattern file or scan engine from Trend Micro. Before scanning other computers for security threats, you should always connect the Scanning Tool to the Management Program computer and get the latest updates. The date next to Last Update shows when you last received an update. Update Settings Click Update settings to enable or disable automatic downloads of the most recent security pattern file or scan engines from Trend Micro immediately after starting up the Management Program. Note: Trend Micro recommends enabling this feature to make sure you always have the most recent components. Editing the Activation Code If the activation code has expired, click Edit and enter a new one. Note: After changing the activation code, you must reactivate the Scanning Tool. For more details, please refer to Activating the Scanning Tool on page 3-5. Checking the Expiration Date of the Activation Code The date next to Expires shows when you need to get another activation code. If you have not connected to the Internet for a while, or if you recently entered a new activation code, click Refresh next to Expires to get the latest expiration date. 3-3

Trend Micro Portable Security 1.5 User Guide Overview Tab Icons Depending on the number of days remaining before your activation code expires, different messages will appear at the bottom of the window. TABLE 3-1. Icons and messages regarding activation codes ICON MESSAGE You have plenty of time before your activation code expires. Your activation code will expire soon, so you should get a new one. Your activation code has expired, so you should provide a new one. You should get a new activation code before your current one expires to ensure that the Scanning Tool always has the most recent updates. 3-4

Using the Management Program Configuring the Scanning Tool Use the Scanning Tool tab to configure and synchronize scan settings and components with a Scanning Tool, change the name of a Scanning Tool, or import log data from previous scans. FIGURE 3-2. Scanning Tool tab Activating the Scanning Tool You must activate the Scanning Tool before using it for the first time. To activate the Scanning Tool, connect it to the computer where you installed the Management Program, then select it from the list of Scanning Tools. Once the Scanning Tool details appear, you have successfully activated the Scanning Tool. 3-5

Trend Micro Portable Security 1.5 User Guide Synchronizing Settings with the Scanning Tool You should transfer scan settings and the latest components to the Scanning Tool before using it. If you made changes to the scan settings and did not synchronize the Scanning Tool, the Scanning Tool will continue to use the previous settings. To synchronize settings: 1. Update the components on the Management Program. 2. Connect the Scanning Tool to the computer where you installed the Management Program. 3. Select the Scanning Tool from the list shown in the Management Program and click Synchronize. 4. When the component selection window appears, click OK. FIGURE 3-3. The Components selection window Tip: Select only the items you want to update and click OK. 3-6

Using the Management Program Changing the Name of the Scanning Tool If you use more than one Scanning Tool and want to assign them different names, select one from the list and click Change Name. Note: Make sure the new name does not exceed 11 characters. Importing Log Data from a Scanning Tool To transfer log data from a Scanning Tool to the Management Program computer, select a Scanning Tool from the list and click Import Logs. Note: To prevent log data from accumulating on the Scanning Tool, mark the After importing, delete the log file from the scanning tool checkbox. Upgrading the Scanning Tool To upgrade the scanning tool, plug in the scanning tool and then click Upgrade Scanning Tool. Configuring Scan Settings Click the Settings tab to select how the Scanning Tool will check for security threats when connected to target computers. Tip: Synchronize the settings to your device after saving the changes you made to the configuration. 3-7

Trend Micro Portable Security 1.5 User Guide FIGURE 3-4. The Settings tab Scanning mode There are two scanning modes: Managed Select this option if you want to retain all Management Program settings when scanning all target computers. This option also automatically starts scanning the computer 30 seconds after the Scanning Tool starts. 3-8

Using the Management Program Custom Select this option if you want to be able to customize scan settings after connecting the Scanning Tool. You can select drives and folders to scan. If this option is selected, you will have to manually click Scan Now to start scanning the computer. Scan action The scan action setting determines what the scan will do. Log only The scan will only identify security threats, without taking any action against them. Confirm The scan will identify security threats and then ask what action to perform. Take the recommended action The scan will automatically respond to security threats according to the recommendations of Trend Micro experts. Tip: Whether the scan will remove the security threat, place the file in quarantine, or skip over it depends on the type of threat. Trend Micro reviews and revises the automatic responses periodically, so they may change after an update. More settings You can also enable or disable these additional scan settings: Scan without saving temporary files The Scanning Tool will not copy any files to the target computer. Using this option reduces scanning capability for certain types of malware. Note: Please ensure that the Scan action is set to Log only. Scanning and cleaning will still save some files on the computer. 3-9

Trend Micro Portable Security 1.5 User Guide Scan as Administrator Selecting this option means you can specify an administrator username and password for users without administrative privileges. Note: You can use a backslash (\) to separate the username from the domain. Configuring Settings For Target Computers Use the followings setting to identify which drives and folders you want to scan. Tip: Synchronize the settings to your device after saving the changes you made to the configuration. FIGURE 3-5. The Target tab 3-10

Using the Management Program Default folders Scan only the folders most vulnerable to system threats (such as the Windows System folder). All folders Scan all folders on the target computer. Specific folders Limit the scan to the drives and folders on the list below it. Click Add to put a drive or folder on the list. Click Delete to take selected drives or folders off the list. Click Edit to make changes to the selected item. Include removable drives as potential scanning targets Enabling this option makes the scan check removable drives, as well. 3-11

Trend Micro Portable Security 1.5 User Guide Configuring Exclusion List Settings Use this setting to exclude files, folders, or extensions from being scanned. Note: You can exclude up to 100 files and folders and use commas to exclude different extensions. Additionally, you can do the following as well: Add a drive or folder on the list Delete selected drives or folders from the list Edit list items Tip: Synchronize the settings to your device after saving the changes you made to the configuration. FIGURE 3-6. Exclusion List screen 3-12

Using the Management Program Managing Log Data The Logs tab allows you to view, delete, and export log data imported from a Scanning Tool. You can also import log data to the Management Program that you previously exported from another Management Program (refer to Importing Log Data on page 3-15). Note: Some older logs might not be compatible with the current program. FIGURE 3-7. Log tab Trend Micro Portable Security arranges imported log data by date. 3-13

Trend Micro Portable Security 1.5 User Guide Viewing Log Data To check the log data, select an item from the list and click View. FIGURE 3-8. Sample of individual log results The Scan Result screen shows the date and time of the scan, the Scanning Tool name, the pattern file version, the scan engine version, the results of the scan, and the names of any security threats found. 3-14

Using the Management Program Deleting Log Data To delete the log data, click Delete All. Note: You cannot delete log data files individually. Exporting Log Data To export the log data from the Management Program to a CSV or XML file, click Export All and then follow the directions shown. Importing Log Data To import log data from exported saved CSV or XML files, click Import Logs, then select the folder containing the log data that you wish to import. Note: To import log data, you must specify the complete path to the folder containing the files. For example, to import the log data in C:\SAMPLE\{log data}, you must specify C:\SAMPLE to find the files. 3-15

Trend Micro Portable Security 1.5 User Guide Configuring a Proxy Server If the computer where you installed the Management Program connects to the Internet through a proxy server, use the Proxy Settings tab to ensure that you can receive the latest components. FIGURE 3-9. Proxy Settings tab 3-16

Using the Management Program Mark the Use a proxy server to connect with the Internet checkbox if your computer is required to use a proxy server to connect to the Internet. Then choose one of the following options: Import the Internet Explorer proxy settings Choose this option if you wish to use the same settings as those set for Microsoft Internet Explorer on the Management Program computer. Enter the necessary proxy server settings in the following fields Choose this option to enter the proxy server settings yourself. Remember to click Save when you finish. Removing the Scanning Tool Follow the procedure below when removing the Scanning Tool from any computer to avoid corrupting the data on the Scanning Tool.. Note: Remove the Scanning Tool only if the light on the USB drive is NOT flashing. For Windows 7 1. Click the system tray icon in the bottom right corner of the Windows desktop to see additional icons. 2. Click the icon to display a list of connected devices. 3. Click Eject TMPS. 4. Unplug the Scanning Tool from the computer. 3-17

Trend Micro Portable Security 1.5 User Guide For Windows Vista or Windows XP 1. Double-click the or system tray icon in the bottom right corner of the Windows desktop to open the Safely Remove Hardware window. 2. Select a Scanning Tool from the list and click Stop to open the Stop a Hardware Device window. 3. Click OK to make the "... can now be safely removed from the system" message appear in the bottom right corner of the Windows desktop. 4. Click Close in the Safely Remove Hardware window. 5. Detach the Scanning Tool from the computer. Upgrading If you are using an older version of the Trend Micro Portable Security Management Program, you need to upgrade to enable the new features. To upgrade the Management Program from an older version: 1. Optionally create back up copies of the logs from the Management Program and Scanning Tool: a. Import the logs from the Scanning Tools, Importing Log Data from a Scanning Tool on page 3-7 b. After gathering all the data from the Scanning Tools, export the logs from the Management Program, refer to Exporting Log Data on page 3-15. 2. Go to the Trend Micro Download Center and download the latest build. 3. Double-click the executable file and follow the instructions to upgrade. 4. Restart the computer. Tip: After upgrading the Management Program, Trend Micro recommends upgrading the Scanning Tool, refer to Upgrading the Scanning Tool on page 3-7. You can also use the Upgrade Device option in the Trend Micro Portable Security Diagnostic Toolkit, refer to Upgrading the Device on page 5-7. This option scans and formats the device to remove any unused or corrupt data. 3-18

Chapter 4 Using the Scanning Tool This chapter describes how to use and configure the Trend Micro Portable Security Scanning Tool. Topics in this chapter: Getting Started on page 4-2 Checking the Scan Results on page 4-4 Checking the Scan History on page 4-7 Checking the Version of the Pattern File and Scan Engine on page 4-8 4-1

Trend Micro Portable Security 1.5 User Guide Getting Started Before you can use the Trend Micro Portable Security Scanning Tool, remember the following: If the user account has administrator privileges, you can use Trend Micro Portable Security to scan the computer. If the No device! message displays, open Windows Explorer and double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. If the user account does not have administrator privileges, you can enable the Scan as Administrator option from the Management Program (Scan as Administrator on page 3-10) then open Windows Explorer and double-click TmSync.exe from the TMPS partition. Trend Micro Portable Security automatically saves the scan result logs in the Scanning Tool. Note: Before using the Scanning Tool, you must first activate it on the computer where you installed the Management Program (see Activating the Scanning Tool on page 3-5). FIGURE 4-1. The Scanning Tool screen 4-2

Using the Scanning Tool To start using the Scanning Tool: 1. Activate the Scanning Tool, refer to Activating the Scanning Tool on page 3-5. 2. Connect the Scanning Tool to the computer that you want to check. 3. Choose Run Trend Micro Portable Security in the window that automatically opens. Note: If the Scanning Tool window does not open, double-click the My Computer icon, and then double-click Launcher.exe from the SECURE partition or TmSync.exe from the TMPS partition. 4. If you selected the Managed scanning mode (see Managed on page 3-8), then the scan will automatically begin 30 seconds after the Scanning Tool window opens. Note: Click Stop if you want to stop scanning the computer. If you selected the Custom scanning mode (see Custom on page 3-9), click Settings... to choose which drives and folders to scan. Control with the Management Program makes the scan examine drives and folders selected under the Target screen in the Management Program. Control from this tab allows you to specify drives and folders to scan. Full system scan checks the entire drive. Custom scan checks drives and folders that you specify in the list. After selecting the desired settings, click OK to close the window, and then click Scan Now. 4-3

Trend Micro Portable Security 1.5 User Guide Checking the Scan Results Follow the appropriate directions below based on the results of the scan. No Security Threats Found If the scan found no threats, then you do not need to take any action. Click Close to shut the window. Tip: If you would like to run a Full or Custom scan after completing a Quick scan, click Scan Again. FIGURE 4-2. No security threats found 4-4

Using the Scanning Tool Security Threats Detected If the scan finds a threat, review the results before selecting an option. FIGURE 4-3. Security threats found 4-5

Trend Micro Portable Security 1.5 User Guide 1. Check the name of the file and the risk, then select a response from the Action column, or just keep the default response. No Trend Micro Portable Security will take no action against the threat. Yes Trend Micro Portable Security will respond to the threat by trying to clean or quarantine the file involved. Tip: The exact response depends on the type of threat detected. Trend Micro periodically reviews and revises the automatic responses to different threats, so they may change after a pattern file or scan engine update. 2. Click Apply Now. A green checkmark will appear beside each completed action. Note: You can click Scan Again to check for security threats once more. 3. After confirming that no more security threats were found, you can add some notes about the scan in the Comment field, and then click Close. Tip: You can type up to 63 characters in the Comment field. This information will appear along with the log data about the scan when you use the Management Program to check the results (see Viewing Log Data on page 3-14). The name of the computer is the default value of this field. 4-6

Using the Scanning Tool Checking the Scan History Use the Previous Scan tab to check the results of earlier scans done on the computer connected to the Scanning Tool. Just choose a scan from the dropdown list next to Last Scan Started. FIGURE 4-4. Previous Scan tab To view more information, click View Log. For more information on the log samples, refer to Viewing Log Data on page 3-14. For threat specific information, you can click the threat name. To restore a quarantined file selected from the list to its original location, click Restore. You should avoid restoring files that might still pose a security risk. Click Close when you have finished checking the scan history. WARNING! To avoid corrupted data on the Scanning Tool, do not remove it without ejecting it first. Refer to Removing the Scanning Tool on page 3-17. 4-7

Trend Micro Portable Security 1.5 User Guide Checking the Version of the Pattern File and Scan Engine The Components tab shows the version of the pattern file and scan engine currently used by the Scanning Tool. FIGURE 4-5. Components tab 4-8

Chapter 5 Using the Diagnostic Toolkit This chapter describes how to use the Trend Micro Portable Security Diagnostic Toolkit. Topics in this chapter: Using the Trend Micro Portable Security Diagnostic Toolkit on page 5-2 5-1

Trend Micro Portable Security 1.5 User Guide Using the Trend Micro Portable Security Diagnostic Toolkit You can use the Trend Micro Portable Security Diagnostic Toolkit to do the following: Move back files, refer to page 5-2. Generate debug logs, refer to page 5-5. Upgrade the device, refer to page 5-7. Uninstallation, refer to page 6-4. Moving Back Files You can move quarantined files from the Management Program computer to the Scanning Tool if you have already deleted quarantined files from the Scanning Tool. WARNING! Do this only if you are absolutely sure that the quarantined files are safe and will not harm your computer. 5-2

Using the Diagnostic Toolkit To move files from the Management Program to the Scanning Tool: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-1. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-3

Trend Micro Portable Security 1.5 User Guide 3. Go to the Move Files tab. FIGURE 5-2. Move Files screen 4. Click Browse and select the location of the quarantined files. 5. Click Move Files. When the confirmation window appears, click Yes. 6. Click OK after transferring the files. 5-4

Using the Diagnostic Toolkit Logging Issues with Trend Micro Portable Security If you have issues with Trend Micro Portable Security and you need to submit log files to Trend Micro Technical Support, turn debugging on and then replicate the issues. The Technical Support team can then identify and help resolve the issues. To generate log files for debugging: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-3. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-5

Trend Micro Portable Security 1.5 User Guide 3. Go to the Debug tab. FIGURE 5-4. Debug screen 4. Select either Management Program or Scanning Tool, depending on which one has an issue. 5. When the Reproduce the Problem screen opens, click Start Debugging Mode, then reproduce the problem. 6. After reproducing the problem, click Stop Debugging Mode, then Collect Data. 7. Send the log files to Trend Micro Technical Support for assessment. 5-6

Using the Diagnostic Toolkit Upgrading the Device If you want to upgrade the device, use the Upgrade Device option in the Trend Micro Portable Security Diagnostic Toolkit. If you want to upgrade the Management Program, refer to Upgrading on page 3-18 or Upgrading the Scanning Tool on page 3-7 to upgrade the Scanning Tool. WARNING! Upgrading the device erases all data on the Scanning Tool. To upgrade the device: 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 5-5. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 5-7

Trend Micro Portable Security 1.5 User Guide 3. Go to the Upgrade Device tab. FIGURE 5-6. Upgrade device screen 4. Specify the location of the device upgrade file. Note: Please make sure that you save all the files you downloaded from the Trend Micro support site in the same folder. 5. Click Yes when the confirmation window opens. 6. Select a format method, then click Upgrade. 5-8

Chapter 6 Uninstallation This chapter describes Trend Micro Portable Security uninstallation procedures. Topics in this chapter: Uninstalling Trend Micro Portable Security on page 6-2 6-1

Trend Micro Portable Security 1.5 User Guide Uninstalling Trend Micro Portable Security You only need to remove the Management Program from the computer where you previously installed it. You do not need to do anything to the computers that you have scanned. To uninstall Trend Micro Portable Security: Option A: From the Windows Start Menu 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Uninstall Trend Micro Portable Security. 2. When the first uninstallation window opens, click Next. FIGURE 6-1. Uninstallation screen 6-2

Uninstallation 3. When the Program Uninstalled window opens, click Close. FIGURE 6-2. Finished uninstallation screen 4. Restart your computer. Option B: From the Control Panel 1. From the Windows Start Menu, go to the Control Panel and select Uninstall a program. 2. Double-click Trend Micro Portable Security from the window that opens. This should start the Uninstallation process. 3. Click Yes when the confirmation window opens. 4. After uninstalling Trend Micro Portable Security, restart your computer. 6-3

Trend Micro Portable Security 1.5 User Guide Option C: Use the Trend Micro Portable Security Diagnostic Toolkit 1. From the Windows Start Menu, select All Programs, click Trend Micro Portable Security, and then choose Trend Micro Portable Security Diagnostic Toolkit. 2. When the End User License Agreement window appears, read the agreement, then select I accept this agreement, and click Next. FIGURE 6-3. Trend Micro Portable Security Diagnostic Toolkit License Agreement screen 6-4

Uninstallation 3. Go to the Uninstall tab, then click Uninstall software. FIGURE 6-4. The Trend Micro Portable Security Diagnostic Toolkit Uninstallation screen 4. When the Uninstallation screen opens, keep a copy of your activation code, then select the Finished saving the activation code option. FIGURE 6-5. Saving the activation code screen 5. Click the Uninstall button. 6. Click Yes when the confirmation window opens. 7. After uninstalling Trend Micro Portable Security, restart your computer. 6-5

Trend Micro Portable Security 1.5 User Guide 8. Go to C:\Program Files\Trend Micro\Portable Security and manually removethe Portable Security folder. 6-6

Chapter 7 Getting Help This chapter describes troubleshooting issues that may arise and how to contact support. Topics in this chapter: Frequently Asked Questions (FAQs) on page 7-2 Technical Support on page 7-2 7-1

Trend Micro Portable Security 1.5 User Guide Frequently Asked Questions (FAQs) Where can I find more information about a threat found? Search the Trend Micro Threat Encyclopedia for the name of a threat shown in the imported log data (Importing Log Data from a Scanning Tool on page 3-7) on this website: http://about-threats.trendmicro.com Why was the log data not saved? Do not remove the Scanning Tool from a computer until the window that displays after you click Close has disappeared. When removing the Scanning Tool from a computer, make sure to follow the Removing the Scanning Tool instructions given on page 3-17, or else the data may become corrupted. Additionally, you can go to the Trend Micro website, which provides answers to questions commonly asked about the software, and covers many useful topics. http://esupport.trendmicro.com/en-us/enterprise/default.aspx You can search the website using the product name or keywords to find information not included in the manual or ReadMe file. Trend Micro continually adds and updates the information available online. Technical Support Activating and registering Trend Micro Portable Security qualifies you to receive a variety of support services. The Trend Micro support website provides the latest information on security threats. Please visit it if you have found a security threat, or if you would like to learn more about the support services available. http://esupport.trendmicro.com/ The content of support services is subject to change without notice. Please contact Trend Micro if you have any questions. You can reach the support center by telephone, FAX, or email. The Trend Micro website lists contact numbers for different regions worldwide. 7-2

Getting Help Support is available for a period of one year once you have completely finished activating your software, although this policy may differ for some licenses. Please make sure to renew your subscription before it expires. If you do not renew your subscription, you will no longer receive security pattern file and scan engine components. For details on how to renew your subscription, contact Trend Micro or an authorized reseller. Note: Before using the Scanning Tool, you must first activate it on the computer where you installed the Management Program (refer to Activating the Scanning Tool on page 3-5). Data Transmissions to Trend Micro About the Web Reputation Service, PhishTrap, Harmful Site/URL Filtering, and TrendProtect 1. Trend Micro uses data received from you to check the security of the pages that you tried to access. Certain information (such as your domain and IP address) about the websites that you have accessed will be encrypted and sent anonymously to Trend Micro for analysis. Trend Micro uses this information to verify the safety of websites and improve the filtering functions. 2. Enabling these features before opening a website may trigger the following results: a. The server providing the page may append information that you have entered to the website as parameters. That means the information you entered (such as your ID, password, etc.) could be sent to Trend Micro as part of the data about the website. Trend Micro uses the data received to check the security of the page you tried to access. b. To check the security of any page that you try to open, Trend Micro examines the specifications of the Web server providing it. Trend Micro also follows a similar process based on URL content parameters when checking a request to open a page. The Trend Micro File Reputation Service sends hash values to Trend Micro to verify the safety of files. Neither the file itself nor any of its content is sent. The Software Safety Evaluation Service sends programs or program information to Trend Micro for risk assessment. 7-3

Trend Micro Portable Security 1.5 User Guide The Virus Tracking / Trendcare Program sends information about any security threats found (including the threat name, number found, region, and the URL of the source website, if applicable) to Trend Micro for statistical purposes. The Trend Micro Anti-Spam Toolbar sends the subject line of spam messages to Trend Micro to help improve the accuracy of the spam mail identification system. Trend Micro may disclose the body of the spam mail to government organizations to reduce the quantity of spam mail or the harm caused by it. The Email Reputation Service sends information about a sender's mail server to Trend Micro for the purpose of identifying spam messages. If a program behaves suspiciously, the Trend Micro Smart Feedback system sends the file checksum, the URL accessed, the size and path of the file, and the name of the executable file to Trend Micro for the purpose of collecting, analyzing, and strengthening protection capabilities. This information is used to determine the safety of the file or program involved. While some personal or confidential information could inadvertently be contained within these files, Trend Micro does not collect or use such information in any way. For more details on how Trend Micro handles information collected from you, please refer to this website: http://www.trendmicro.com/us/about-us/legal-policies/privacy-statement/index.html The "Web Reputation Service," "TrendProtect," and other Trend Micro filtering software checks the security of a given website according to proprietary standards set by Trend Micro. Whether or not you can then access a given website may not be entirely up to you after a judgment has been made. Export Controls This product and its technology ("Software") may be subject to export controls, the Foreign Exchange and Foreign Trade Act, Export Trade Control Order, Foreign Exchange Order, and ministerial ordinance or U.S. Export Administration Regulations. It may also be designated an "export control item" by the trade laws of other countries. You may not export or re-export the Software to a company, resident, citizen, or embargoed person or company of any embargoed country or any country with a trade sanction without the appropriate U.S. or foreign government licenses. Nations subject to U.S. embargo include Cuba, Iran, North Korea, Sudan, and Syria as of May 2010. 7-4

Getting Help Further information about embargoed countries is available by searching the following websites. You are responsible for any violation of such export control laws related to the Software. You should take appropriate measures to prevent violations. http://www.treas.gov/offices/enforcement/ofac/ http://www.bis.doc.gov/complianceandenforcement/liststocheck.htm By using the Software, you confirm that you are not a resident or citizen of any country currently embargoed by the U.S., and that you are not otherwise prohibited under the export laws from receiving it. You also agree not to use this product in the development, design, manufacture, or production of nuclear weapons, chemical weapons, biological weapons, or missiles intended as weapons of mass destruction. Multi-year Contracts Even if you pay for multi-year contracts (by paying more than one year of support fees in advance), Trend Micro sets the period during which support for a product shall be provided without regard to your contract term. Please note that multi-year contracts do not guarantee product support during the applicable contract period, nor do they guarantee upgrades if the product support period has concluded. 7-5

Trend Micro Portable Security 1.5 User Guide 7-6