Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Similar documents

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Core Protection for Virtual Machines 1



Copyright 2012 Trend Micro Incorporated. All rights reserved.


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Encryption Gateway 5

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X


License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM

Worry-Free TM Remote Manager TM 1

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Copyright 2013 Trend Micro Incorporated. All rights reserved.

for Small and Medium Business Quick Start Guide

Quick Start Guide. www. K7Computing.com

Core Protection Module 1.6 for Mac powered by. User s Guide

Trend Micro Antivirus for Mac 2016



User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

VMware Horizon FLEX User Guide


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sophos for Microsoft SharePoint startup guide

Trend Micro OfficeScan Best Practice Guide for Malware

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Client Server Messaging Security3


OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

TREND MICRO. InterScan VirusWall 6. Getting Started Guide. Integrated virus and spam protection for your Internet gateway.


Antivirus. Quick Start Guide. Antivirus

Sophos Anti-Virus for Mac OS X network startup guide. For networked Macs running Mac OS X


McAfee Endpoint Security Software

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

Sophos Endpoint Security and Control standalone startup guide

Parallels Transporter Agent


Education Software Installer 2014

Sophos Anti-Virus for NetApp Storage Systems startup guide


McAfee Enterprise Edition v Installation & Configuration For Windows 98 and Me

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2


Software License Registration Guide

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Online Backup Client User Manual

Verizon Internet Security Suite Powered by McAfee User Guide

TREND MICRO. ServerProtect5. Comprehensive server and storage virus protection. For Network Appliance. Filers

Sophos Anti-Virus for Mac OS X network startup guide

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X: Home Edition Help

Installation Instructions

Setting up FileMaker 10 Server

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS

Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide

Contents. McAfee Internet Security 3

Endpoint protection for physical and virtual desktops

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Installing and Configuring vcenter Multi-Hypervisor Manager

VMware Horizon FLEX User Guide

Getting Started with Symantec Endpoint Protection

Intego Enterprise Software Deployment Guide

Attix5 Pro Server Edition

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Best Practice Configurations for OfficeScan (OSCE) 10.6

Installation Instructions

Fiery E100 Color Server. Welcome

TIBCO Hawk SNMP Adapter Installation

Parallels Virtual Automation 6.1

Administering Parallels Desktop 7 for Mac with the Casper Suite. Technical Paper November 2012

VMware Horizon FLEX User Guide

Anti-Spyware Enterprise Module software

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

OfficeScan. Client/Server Edition 8 for Enterprise and Medium Business

Connecting to Remote Desktop Windows Users

Stellar Phoenix Exchange Server Backup

Bitdefender Antivirus for Mac User's Guide

Installing Management Applications on VNX for File

User's Manual. Intego Remote Management Console User's Manual Page 1

How To Install & Use Metascan With Policy Patrol

Windows Server Update Services 3.0 SP2 Step By Step Guide

Symantec Mail Security for Domino

for Small and Medium Business Getting Started Guide for Resellers

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2009 Trend Micro Incorporated. All rights reserved. Document Part No. ACEM14037/90306 Release Date: April 2009 Patents Pending

The Trend Micro Security for Macintosh user documentation contains product feature information, installation, deployment, and uninstallation instructions for your production environment. You should read the documentation prior to installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro s Web site at: http://esupport.trendmicro.com/default.aspx Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp

Contents Preface Chapter 1: Chapter 2: Chapter 3: Chapter 4: Trend Micro Security for Macintosh Documentation...vi Audience...vi Document Conventions...vii Introducing Trend Micro Security for Macintosh Introducing Trend Micro Security for Macintosh... 1-2 Features and Benefits... 1-3 Malware Protection... 1-3 Web Protection... 1-4 Logs... 1-4 Notifications... 1-4 Deploying Trend Micro Security for Macintosh System Requirements... 2-2 Pre-Installation Considerations... 2-2 Deploying Trend Micro Security for Macintosh... 2-3 Local Installation... 2-6 Post Installation Tasks... 2-14 Deploying Settings Deploying Settings... 3-2 Step 1: Configure Settings... 3-3 Step 2: Stop the Trend Micro Security for Macintosh Process... 3-10 Step 3: Copy Settings... 3-14 Step 4: Restart Endpoint Computers... 3-16 Uninstalling Trend Micro Security for Macintosh Uninstalling Trend Micro Security for Macintosh... 4-2 Using Apple Remote Desktop... 4-2 Local Uninstallation... 4-7 iii

Trend Micro Security for Macintosh Remote Deployment Guide Chapter 5: Chapter 6: Frequently Asked Questions Frequently Asked Questions...5-2 Getting Support Contacting Technical Support...6-2 Sending Infected File Samples...6-3 Introducing TrendLabs...6-3 Other Useful Resources...6-4 Index iv

Preface Preface Welcome to the Trend Micro Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels. This chapter discusses the following topics: Trend Micro Security for Macintosh Documentation on page vi Audience on page vi Document Conventions on page vii v

Trend Micro Security for Macintosh Remote Deployment Guide Trend Micro Security for Macintosh Documentation The Trend Micro Security for Macintosh documentation consists of the following: Help Helps you configure product features through the user interface. You can access the help by opening the product console and then clicking the help icon. User s Guide Helps you plan for deployment and configure product settings. Remote Deployment Guide Helps you deploy product and configurations remotely Read Me File Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history. The product documents are available at: http://www.trendmicro.com/download Audience Trend Micro Security for Macintosh documentation is written for IT managers and end-users. The documentation assumes that the reader has experience working with Apple Macintosh computers and has basic experience installing and using software applications for Macintosh computers. vi

Document Conventions To help you locate and interpret information easily, the Trend Micro Security for Macintosh documentation uses the following conventions. TABLE 2-1. Document Conventions CONVENTION ALL CAPITALS Bold Italics Monospace Note: DESCRIPTION ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY- BOARD Menus and menu commands, command buttons, tabs, options, and Trend Micro Security for Macintosh tasks References to other documentation Examples, sample command lines, program code, Web URL, file name, and program output Configuration notes Tip: Recommendations WARNING! Reminders on actions or configurations that should be avoided vii

Trend Micro Security for Macintosh Remote Deployment Guide viii

Chapter 1 Introducing Trend Micro Security for Macintosh This chapter introduces Trend Micro Security for Macintosh and provides a brief description of its components and a list of features and benefits. This chapter discusses the following topics: Introducing Trend Micro Security for Macintosh on page 1-2 Features and Benefits on page 1-3 Malware Protection on page 1-3 Web Protection on page 1-4 Logs on page 1-4 Notifications on page 1-4 1-1

Trend Micro Security for Macintosh Remote Deployment Guide Introducing Trend Micro Security for Macintosh Trend Micro Security for Macintosh is a security client designed specifically for Mac OS X. Trend Micro Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware. FIGURE 1-1 Trend Micro Security for Macintosh Protection Status screen 1-2

Introducing Trend Micro Security for Macintosh Features and Benefits Trend Micro Security for Macintosh provides the following features and benefits: Comprehensive Malware Protection Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge. Complete Web Protection Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings. Simple Installation Trend Micro Security for Macintosh provides a wizard-type installation program, tmsminstall.mpkg that allows users to install the product on a single computer. You can also use Apple Remote Desktop for easy installation on several computers. Easy to Use Product Console The Trend Micro Security for Macintosh product console provides quick access to the most commonly used security features and settings. Instant and Informative Notifications Configure Trend Micro Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end. Malware Protection Malware Protection provides three scan methods to protect users from malware. Enable Real-time Scan to have the Trend Micro Security for Macintosh scan for malware when opening, closing, saving, and downloading files. Scan for malware and other threats on demand with Manual Scan. Configure Scheduled Scan to scan for malware at regularly scheduled intervals. 1-3

Trend Micro Security for Macintosh Remote Deployment Guide Web Protection Web Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware. Logs To provide current information about the security of your computer, Trend Micro Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly. Notifications Configure Trend Micro Security for Macintosh to display notifications in response to program events and security events. Program events such as scans and updates, and security events such as malware detections, Web site violations, and Web threat detections. 1-4

Chapter 2 Deploying Trend Micro Security for Macintosh This chapter describes the requirements and process for deploying Trend Micro Security for Macintosh. This chapter also includes a list of post installation tasks. This chapter discusses the following topics: System Requirements on page 2-2 Pre-Installation Considerations on page 2-2 Deploying Trend Micro Security for Macintosh on page 2-3 Local Installation on page 2-6 Post Installation Tasks on page 2-14 2-1

Trend Micro Security for Macintosh Remote Deployment Guide System Requirements To run the Trend Micro Security for Macintosh, your computer must meet the following requirements: Hardware: Macintosh computer with PowerPC and Intel core processor 256MB RAM 100MB available hard disk space Software: Mac OS X version 10.4.11 (Tiger) or higher Mac OS X version 10.5.5 (Leopard) or higher Apple Remote Desktop The Trend Micro Security for Macintosh needs an Internet connection to perform the following tasks: Download product and component updates Obtain virus information Browse Web pages on the Trend Micro Web site. Pre-Installation Considerations To ensure a successful installation and operation of Trend Micro Security for Macintosh, check for and uninstall other installed antivirus and anti-spyware products before installing Trend Micro Security for Macintosh. Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation. 2-2

Deploying Trend Micro Security for Macintosh Deploying Trend Micro Security for Macintosh The process of installing Trend Micro Security for Macintosh on several computers can be simplified by using Apple Remote Desktop. To deploy Trend Micro Security for Macintosh to endpoint computers: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers to deploy to in Apple Remote Desktop. FIGURE 2-1 Remote Desktop screen 3. Click Install. The Install Packages screen appears. 2-3

Trend Micro Security for Macintosh Remote Deployment Guide 4. Drag the Trend Micro Security for Macintosh installer package on this screen. Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages. FIGURE 2-2 Install Packages screen 5. (Optional) Click Save to save this task for deployment to new machines installed in the network. 6. Click Install. The Remote Desktop starts installing the package to the selected endpoints. 2-4

Deploying Trend Micro Security for Macintosh 7. Verify that the installation was successful. The message Install Packages: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 2-3 Successful installation screen 2-5

Trend Micro Security for Macintosh Remote Deployment Guide Local Installation The process of installing Trend Micro Security for Macintosh on a single computer is similar to the installation process for other Macintosh software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. To install Trend Micro Security for Macintosh: 1. Uninstall other security software products. Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation. 2-6

Deploying Trend Micro Security for Macintosh 2. Double-click the Trend Micro Security for Macintosh Standalone-1.0.xxx.dmg file. The files included in the disk image appears. FIGURE 2-4 Trend Micro Security for Macintosh files included in the disk image 2-7

Trend Micro Security for Macintosh Remote Deployment Guide 3. Double-click the Install Trend Micro Security Standalone icon to launch the installation program. The confirmation message appears. FIGURE 2-5 Confirm installation popup 4. Click Continue. The Introduction screen appears. FIGURE 2-6 Introduction screen 2-8

Deploying Trend Micro Security for Macintosh 5. Click Continue. The Important Information screen appears. FIGURE 2-7 Important Information screen 6. Read the Read Me file. 2-9

Trend Micro Security for Macintosh Remote Deployment Guide 7. Click Continue. The Software License Agreement screen appears. 8. Read the License agreement. 9. Click Continue. The confirmation message appears. FIGURE 2-8 Continue installation popup 2-10

Deploying Trend Micro Security for Macintosh 10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears. 11. Click Agree. The Standard Install screen appears. FIGURE 2-9 Standard install screen 2-11

Trend Micro Security for Macintosh Remote Deployment Guide 12. Click Install to accept the default installation or click Change Install Location to select a different location. The password confirmation popup appears. FIGURE 2-10 Password confirmation popup 13. Type the Name and Password. Note: The name and password need to have the appropriate administrative credentials to continue with the installation. 2-12

Deploying Trend Micro Security for Macintosh 14. Click OK. The installation process begins. FIGURE 2-11 Installing Trend Micro Security screen 2-13

Trend Micro Security for Macintosh Remote Deployment Guide 15. If the installation is successful, the Installation completed successfully screen appears. FIGURE 2-12 Installation completed successfully screen 16. Click Close. Post Installation Tasks Immediately after installing Trend Micro Security for Macintosh, perform the following tasks to ensure that: the product is working the product has the newest components your computer is protected and free from malware and spyware/grayware 2-14

Deploying Trend Micro Security for Macintosh Perform the following tasks: 1. Access the Trend Micro Security for Macintosh product console. 2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection. 3. Check for Internet connectivity by opening a Web browser and try to access: Http://www.trendmicro.com 4. Update the product using Update Now. 5. Scan your computer for malware and spyware/grayware using Scan Now. 2-15

Trend Micro Security for Macintosh Remote Deployment Guide 2-16

Chapter 3 Deploying Settings This chapter describes how to deploy Trend Micro Security for Macintosh basic configuration settings to endpoint computers. This chapter discusses the following topics: Deploying Settings on page 3-2 3-1

Trend Micro Security for Macintosh Remote Deployment Guide Deploying Settings Individual settings can be modified from the administrator s computer and deployed to endpoint computers. Refer to the Trend Micro Security for Macintosh User s Guide for more information on these procedures. To deploy the settings: Step 1: Configure Settings on page 3-3 Step 2: Stop the Trend Micro Security for Macintosh Process on page 3-10 Step 3: Copy Settings on page 3-14 Step 4: Restart Endpoint Computers on page 3-16 3-2

Deploying Settings Step 1: Configure Settings Configure the baseline settings from the administrator s computer before deploying to endpoint computers. Refer to the Trend Micro Security for Macintosh User s Guide for more information on these settings. Configure the following settings from the administrator s computer for deployment: Note: Only these settings can be deployed to endpoint computers. Web Protection Web Threat Protection settings FIGURE 3-1 Web Threat Protection screen 3-3

Trend Micro Security for Macintosh Remote Deployment Guide Approved Websites FIGURE 3-2 Approved Websites screen 3-4

Deploying Settings Scan Settings Real-time Scan settings FIGURE 3-3 Real-time Scan settings screen 3-5

Trend Micro Security for Macintosh Remote Deployment Guide Manual Scan settings FIGURE 3-4 Manual Scan settings screen 3-6

Deploying Settings Scheduled Scan settings FIGURE 3-5 Scheduled Scan settings screen 3-7

Trend Micro Security for Macintosh Remote Deployment Guide Exception List FIGURE 3-6 Exception List screen 3-8

Deploying Settings Update settings AutoUpdate settings FIGURE 3-7 Auto Update screen 3-9

Trend Micro Security for Macintosh Remote Deployment Guide Proxy Settings FIGURE 3-8 Proxy Settings screen Step 2: Stop the Trend Micro Security for Macintosh Process Stop the Trend Micro Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop. To stop the Trend Micro Security for Macintosh process: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 3-10

Deploying Settings 2. Select the endpoint computers to deploy to in Apple Remote Desktop. FIGURE 3-9 Apple Remote Desktop screen 3. Click UNIX. The Send UNIX Command screen appears. 3-11

Trend Micro Security for Macintosh Remote Deployment Guide 4. Type the following UNIX command: sudo SystemStarter stop TmccCore FIGURE 3-10 The Send UNIX Command screen 5. Select User and type root under Run Command as. 6. (Optional) Click Save to save this command for deployment to new computers installed in the network. 3-12

Deploying Settings 7. Click Send. The Send UNIX Command processing request screen appears. FIGURE 3-11 Send UNIX Command processing request screen 3-13

Trend Micro Security for Macintosh Remote Deployment Guide 8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-12 Successfully stopped process screen Step 3: Copy Settings Copy the settings from the administrator s computer to the endpoint computers using Apple Remote Desktop. To copy the settings: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers to deploy to in Apple Remote Desktop. 3-14

Deploying Settings 3. Click Copy. The Copy Items screen appears. FIGURE 3-13 The Copy Items screen 4. Select the tmcccore.conf.plist and tmccmac.com.plist files from the.../library/application Support/TrendMicro/common/conf folder. 5. Select Same relative location beside Place items in. 6. Select Replace the item beside If an item already exists. 7. Select Inherit from destination folder beside Set item ownership to. 3-15

Trend Micro Security for Macintosh Remote Deployment Guide 8. (Optional) Click Save to save this command for deployment to new machines installed in the network. 9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer. 10. Verify that the setting deployment was successful. The Copy Items: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-14 Successfully copied items screen Step 4: Restart Endpoint Computers Restart endpoint computers to ensure that the settings have been deployed. To restart endpoint computers: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 3-16

Deploying Settings 2. Select Manage from the Apple Remote Desktop application menu. FIGURE 3-15 Apple Remote Desktop application menu 3-17

Trend Micro Security for Macintosh Remote Deployment Guide 3. Select Restart. The Restart Computers screen appears. FIGURE 3-16 Restart Computers screen 4. Select the endpoint computers to restart. 5. Click Restart. Apple Remote Desktop remotely restarts endpoint computers. 3-18

Deploying Settings 6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected endpoints. FIGURE 3-17 Restart Computers: Succeeded screen 3-19

Trend Micro Security for Macintosh Remote Deployment Guide 3-20

Chapter 4 Uninstalling Trend Micro Security for Macintosh This chapter describes the Trend Micro Security for Macintosh uninstallation. This chapter discusses the following topics: Uninstalling Trend Micro Security for Macintosh on page 4-2 4-1

Trend Micro Security for Macintosh Remote Deployment Guide Uninstalling Trend Micro Security for Macintosh The process of uninstalling Trend Micro Security for Macintosh is similar to the uninstallation process for other Macintosh software. There are two ways to uninstall Trend Micro Security for Macintosh: Using Apple Remote Desktop Uninstalling manually from the local machine Using Apple Remote Desktop Use this process to uninstall remotely from one or several computers. To uninstall using Apple Remote Desktop: 1. Open Apple Remote Desktop. The Remote Desktop screen appears. 2. Select the endpoint computers for uninstallation. 4-2

Uninstalling Trend Micro Security for Macintosh 3. Click UNIX. The Send UNIX Command screen opens. FIGURE 4-1 Remote Desktop screen 4-3

Trend Micro Security for Macintosh Remote Deployment Guide 4. Type the following UNIX command: /Library/Application\ Support/TrendMicro/uninstall/uninstall.sh FIGURE 4-2 Send UNIX Command screen 5. Select User and type root under Run Command as. 6. (Optional) Click Save to save this command for deployment to computers in the network. 4-4

Uninstalling Trend Micro Security for Macintosh 7. Click Send. The Send UNIX Command processing request screen appears. FIGURE 4-3 Processing computer uninstallation screen 4-5

Trend Micro Security for Macintosh Remote Deployment Guide 8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected endpoints. FIGURE 4-4 Successfully uninstalled program screen 4-6

Uninstalling Trend Micro Security for Macintosh Local Uninstallation Use this process to uninstall from a single computer in the network. To manually uninstall Trend Micro Security for Macintosh: 1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears. FIGURE 4-5 Trend Micro Security for Macintosh files included in the disk image 4-7

Trend Micro Security for Macintosh Remote Deployment Guide 2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears. FIGURE 4-6 Confirm uninstallation popup 3. Click Uninstall. The password confirmation popup appears. FIGURE 4-7 Password confirmation popup 4. Type the Name and Password. Note: The name and password need to have the appropriate administrative credentials to continue with the uninstallation. 4-8

Uninstalling Trend Micro Security for Macintosh 5. Click OK. The uninstallation process begins. FIGURE 4-8 Uninstalling Trend Micro Security screen 6. If uninstallation is successful, an Uninstallation Completed screen will appear. FIGURE 4-9 Uninstallation completed screen 7. Click OK. 4-9

Trend Micro Security for Macintosh Remote Deployment Guide 4-10

Chapter 5 Frequently Asked Questions This chapter presents and answers frequently asked questions about Trend Micro Security for Macintosh. This chapter discusses the following topics: Frequently Asked Questions on page 5-2 5-1

Trend Micro Security for Macintosh Remote Deployment Guide Frequently Asked Questions Installation Why do I receive a warning when I install Trend Micro Security for Macintosh on OS X version 10.4.11 or 10.5.5 or lower? Trend Micro Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard). If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend Micro Security for Macintosh on a version of Tiger lower than 10.4.11. If you are using the Leopard version of the Mac OS X (10.5), you can install Trend Micro Security for Macintosh on versions of Leopard that are less than 10.5.5. However, Trend Micro Security for Macintosh will issue a warning. Tip: Trend Micro recommends using the latest version of the Mac operating system. Uninstallation Why does no popup window appear when I try to uninstall Trend Micro Security for Macintosh? When you attempt to uninstall Trend Micro Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your administrator credentials anytime within the previous 5 minutes, Trend Micro Security for Macintosh will remember them and the uninstallation program will not require you to provide the credentials again. What do I do if I receive an uninstall failed message? 1. Restart your computer. 2. Reinstall Trend Micro Security for Macintosh. 3. Use the uninstall tool to uninstall Trend Micro Security for Macintosh. 5-2

Frequently Asked Questions Compatibility What do I do if my computer performance decreases after installing Trend Micro Security for Macintosh? Check if there are other antivirus products installed on your computer. Some antivirus products are not compatible with Trend Micro Security for Macintosh. To determine if Trend Micro Security for Macintosh is causing the performance problem, use the Activity Monitor to identify and close applications that display high resource usage. If the problem persists after closing the other applications, contact your support provider. 5-3

Trend Micro Security for Macintosh Remote Deployment Guide 5-4

Chapter 6 Getting Support Trend Micro is committed to providing service and support that exceeds our users expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support. This chapter discusses the following topics: Contacting Technical Support on page 6-2 Sending Infected File Samples on page 6-3 Introducing TrendLabs on page 6-3 Other Useful Resources on page 6-4 6-1

Trend Micro Security for Macintosh Remote Deployment Guide Contacting Technical Support Before contacting technical support, here are two things you can quickly do to try and find a solution to your questions: Check your documentation: the FAQ section of this User s Guide and Online Help provide comprehensive information about Trend Micro Security for Macintosh. Search both documents to see if they contain your solution. Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro products The support Web site has answers to previous user inquiries. To search the Knowledge Base, visit http://esupport.trendmicro.com/support In addition to phone support, Trend Micro provides the following resources: Email support support@trendmicro.com Readme: late-breaking product news, installation instructions, known issues, and version specific information Product updates and patches http://www.trendmicro.com/download/ To locate the Trend Micro office nearest you, open a Web browser to the following URL: http://www.trendmicro.com/en/about/contact/overview.htm To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can: Version Exact text of the error message, if any Steps to reproduce the problem 6-2

Getting Support Sending Infected File Samples You can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address: http://subwiz.trendmicro.com/subwiz/default.asp Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain. Introducing TrendLabs Trend Micro TrendLabs SM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world. Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world. For more information about TrendLabs, please visit: www.trendmicro.com/en/security/trendlabs/overview.htm 6-3

Trend Micro Security for Macintosh Remote Deployment Guide Other Useful Resources Trend Micro offers a host of services through its Web site, www.trendmicro.com. Internet-based tools and services include: Virus Map: monitors virus incidents around the world Virus risk assessment: the Trend Micro online virus protection assessment program for corporate networks 6-4

Index A Apple Remote Desktop 2-3, 3-10, 4-2 Audience vi B Baseline settings 3-3 C Copy Items 3-15 Copy Settings 3-14 D Deployment 2-3 DMG Image 2-6 Document document conventions vii Document Conventions vii Document Feedback 1-ii Documentation audience vi F FAQs 5-2 Compatibility 5-3 Installation 5-2 Uninstallation 5-2 Features and Benefits 1-3 Feedback 1-ii H Help Icon vi I Installation dmg image 2-6 local 2-6 manual 2-6 post installation 2-14 pre-installation 2-2 remote 2-3 success 2-5 Installation Program 2-8 Interface protection status 1-2 L License Agreement 2-10 Logs 1-4 M Malware Protection 1-3 N Notifications 1-4 P Post Installation Tasks 2-14 Pre-installation Considerations 2-2 R Remote Desktop 2-3, 3-10, 4-2 Restart 3-16 S Send UNIX Command 3-11 Software License Agreement 2-10 System Requirements about 2-2 hardware 2-2 software 2-2 T Tmcccore.conf.plist 3-15 Tmccmac.com.plist 3-15 Trademarks 1-i U Uninstallation 4-1 4-2 local 4-7 manual 4-7 remote 4-2 UNIX Command 3-12, 4-4 W Web Protection 1-4 IN 1

Trend Micro Security for Macintosh Remote Deployment Guide IN 2