Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners.
Copyright© 2009 Trend Micro Incorporated. All rights reserved.
Document Part No. ACEM14037/90306
Release Date: April 2009
Patents Pending
The Trend Micro™ Security for Macintosh user documentation contains product feature information, installation, deployment, and uninstallation instructions for your production environment. You should read the documentation prior to installing or using the software.
Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s Web site at:
http://esupport.trendmicro.com/default.aspx
Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
ContentsPreface
Trend Micro™ Security for Macintosh Documentation .................................viAudience ..............................................................................................................viDocument Conventions ..................................................................................vii
Chapter 1: Introducing Trend Micro™ Security for MacintoshIntroducing Trend Micro™ Security for Macintosh ..................................... 1-2Features and Benefits ..................................................................................... 1-3Malware Protection ......................................................................................... 1-3Web Protection ............................................................................................... 1-4Logs ................................................................................................................... 1-4Notifications .................................................................................................... 1-4
Chapter 2: Deploying Trend Micro™ Security for MacintoshSystem Requirements ..................................................................................... 2-2Pre-Installation Considerations .................................................................... 2-2Deploying Trend Micro™ Security for Macintosh ....................................... 2-3Local Installation ............................................................................................. 2-6Post Installation Tasks ................................................................................. 2-14
Chapter 3: Deploying SettingsDeploying Settings .......................................................................................... 3-2
Step 1: Configure Settings ........................................................................ 3-3Step 2: Stop the Trend Micro™ Security for Macintosh Process ........ 3-10Step 3: Copy Settings ............................................................................... 3-14Step 4: Restart Endpoint Computers .................................................... 3-16
Chapter 4: Uninstalling Trend Micro™ Security for MacintoshUninstalling Trend Micro™ Security for Macintosh .................................... 4-2
Using Apple Remote Desktop ................................................................. 4-2Local Uninstallation ................................................................................... 4-7
iii
Trend Micro™ Security for Macintosh Remote Deployment Guide
Chapter 5: Frequently Asked QuestionsFrequently Asked Questions .........................................................................5-2
Chapter 6: Getting SupportContacting Technical Support .......................................................................6-2Sending Infected File Samples ......................................................................6-3Introducing TrendLabs ..................................................................................6-3Other Useful Resources .................................................................................6-4
Index
iv
Preface
Preface
Welcome to the Trend Micro™ Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels.
This chapter discusses the following topics: • Trend Micro™ Security for Macintosh Documentation on page vi• Audience on page vi• Document Conventions on page vii
v
Trend Micro™ Security for Macintosh Remote Deployment Guide
Trend Micro™ Security for Macintosh Documentation
The Trend Micro™ Security for Macintosh documentation consists of the following:
Help—Helps you configure product features through the user interface. You can access
the help by opening the product console and then clicking the help icon .
User’s Guide—Helps you plan for deployment and configure product settings.
Remote Deployment Guide—Helps you deploy product and configurations remotely
Read Me File—Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history.
The product documents are available at:
http://www.trendmicro.com/download
AudienceTrend Micro™ Security for Macintosh documentation is written for IT managers and end-users. The documentation assumes that the reader has experience working with Apple™ Macintosh™ computers and has basic experience installing and using software applications for Macintosh computers.
vi
Document ConventionsTo help you locate and interpret information easily, the Trend Micro™ Security for Macintosh documentation uses the following conventions.
TABLE 2-1. Document Conventions
CONVENTION DESCRIPTION
ALL CAPITALS ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY-BOARD
Bold Menus and menu commands, command buttons, tabs, options, and Trend Micro™ Security for Mac-intosh tasks
Italics References to other documentation
Monospace Examples, sample command lines, program code, Web URL, file name, and program output
Note:Configuration notes
Tip: Recommendations
WARNING!Reminders on actions or configurations that should be avoided
vii
Chapter 1
Introducing Trend Micro™ Security for Macintosh
This chapter introduces Trend Micro™ Security for Macintosh and provides a brief description of its components and a list of features and benefits.
This chapter discusses the following topics:• Introducing Trend Micro™ Security for Macintosh on page 1-2• Features and Benefits on page 1-3• Malware Protection on page 1-3• Web Protection on page 1-4• Logs on page 1-4• Notifications on page 1-4
1-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
Introducing Trend Micro™ Security for MacintoshTrend Micro™ Security for Macintosh is a security client designed specifically for Mac OS™ X. Trend Micro™ Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro™ Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware.
FIGURE 1-1 Trend Micro™ Security for Macintosh Protection Status screen
1-2
Introducing Trend Micro™ Security for Macintosh
Features and BenefitsTrend Micro™ Security for Macintosh provides the following features and benefits:
Comprehensive Malware Protection
Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge.
Complete Web Protection
Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings.
Simple Installation
Trend Micro™ Security for Macintosh provides a wizard-type installation program, tmsminstall.mpkg that allows users to install the product on a single computer. You can also use Apple Remote Desktop™ for easy installation on several computers.
Easy to Use Product Console
The Trend Micro™ Security for Macintosh product console provides quick access to the most commonly used security features and settings.
Instant and Informative Notifications
Configure Trend Micro™ Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end.
Malware ProtectionMalware Protection provides three scan methods to protect users from malware. Enable Real-time Scan to have the Trend Micro™ Security for Macintosh scan for malware when opening, closing, saving, and downloading files. Scan for malware and other threats on demand with Manual Scan. Configure Scheduled Scan to scan for malware at regularly scheduled intervals.
1-3
Trend Micro™ Security for Macintosh Remote Deployment Guide
Web ProtectionWeb Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware.
LogsTo provide current information about the security of your computer, Trend Micro™ Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly.
NotificationsConfigure Trend Micro™ Security for Macintosh to display notifications in response to program events and security events. Program events such as scans and updates, and security events such as malware detections, Web site violations, and Web threat detections.
1-4
Chapter 2
Deploying Trend Micro™ Security for Macintosh
This chapter describes the requirements and process for deploying Trend Micro™ Security for Macintosh. This chapter also includes a list of post installation tasks.
This chapter discusses the following topics:• System Requirements on page 2-2• Pre-Installation Considerations on page 2-2• Deploying Trend Micro™ Security for Macintosh on page 2-3• Local Installation on page 2-6• Post Installation Tasks on page 2-14
2-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
System RequirementsTo run the Trend Micro™ Security for Macintosh, your computer must meet the following requirements:
Hardware:• Macintosh™ computer with PowerPC™ and Intel™ core processor• 256MB RAM• 100MB available hard disk space
Software:• Mac OS™ X version 10.4.11 (Tiger) or higher• Mac OS™ X version 10.5.5 (Leopard) or higher• Apple Remote Desktop™
The Trend Micro™ Security for Macintosh needs an Internet connection to perform the following tasks:• Download product and component updates• Obtain virus information• Browse Web pages on the Trend Micro Web site.
Pre-Installation ConsiderationsTo ensure a successful installation and operation of Trend Micro™ Security for Macintosh, check for and uninstall other installed antivirus and anti-spyware products before installing Trend Micro™ Security for Macintosh.
Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation.
2-2
Deploying Trend Micro™ Security for Macintosh
Deploying Trend Micro™ Security for MacintoshThe process of installing Trend Micro™ Security for Macintosh on several computers can be simplified by using Apple Remote Desktop.
To deploy Trend Micro™ Security for Macintosh to endpoint computers:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers to deploy to in Apple Remote Desktop.
FIGURE 2-1 Remote Desktop screen
3. Click Install. The Install Packages screen appears.
2-3
Trend Micro™ Security for Macintosh Remote Deployment Guide
4. Drag the Trend Micro™ Security for Macintosh installer package on this screen. Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages.
FIGURE 2-2 Install Packages screen
5. (Optional) Click Save to save this task for deployment to new machines installed in the network.
6. Click Install. The Remote Desktop starts installing the package to the selected endpoints.
2-4
Deploying Trend Micro™ Security for Macintosh
7. Verify that the installation was successful. The message Install Packages: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.
FIGURE 2-3 Successful installation screen
2-5
Trend Micro™ Security for Macintosh Remote Deployment Guide
Local InstallationThe process of installing Trend Micro™ Security for Macintosh on a single computer is similar to the installation process for other Macintosh™ software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file.
To install Trend Micro™ Security for Macintosh:
1. Uninstall other security software products.
Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation.
2-6
Deploying Trend Micro™ Security for Macintosh
2. Double-click the Trend Micro Security for Macintosh Standalone-1.0.xxx.dmg file. The files included in the disk image appears.
FIGURE 2-4 Trend Micro™ Security for Macintosh files included in the disk image
2-7
Trend Micro™ Security for Macintosh Remote Deployment Guide
3. Double-click the Install Trend Micro Security Standalone icon to launch the installation program. The confirmation message appears.
FIGURE 2-5 Confirm installation popup
4. Click Continue. The Introduction screen appears.
FIGURE 2-6 Introduction screen
2-8
Deploying Trend Micro™ Security for Macintosh
5. Click Continue. The Important Information screen appears.
FIGURE 2-7 Important Information screen
6. Read the Read Me file.
2-9
Trend Micro™ Security for Macintosh Remote Deployment Guide
7. Click Continue. The Software License Agreement screen appears.
8. Read the License agreement. 9. Click Continue. The confirmation message appears.
FIGURE 2-8 Continue installation popup
2-10
Deploying Trend Micro™ Security for Macintosh
10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears.
11. Click Agree. The Standard Install screen appears.
FIGURE 2-9 Standard install screen
2-11
Trend Micro™ Security for Macintosh Remote Deployment Guide
12. Click Install to accept the default installation or click Change Install Location to select a different location. The password confirmation popup appears.
FIGURE 2-10 Password confirmation popup
13. Type the Name and Password.
Note: The name and password need to have the appropriate administrative credentials to continue with the installation.
2-12
Deploying Trend Micro™ Security for Macintosh
14. Click OK. The installation process begins.
FIGURE 2-11 Installing Trend Micro Security screen
2-13
Trend Micro™ Security for Macintosh Remote Deployment Guide
15. If the installation is successful, the Installation completed successfully screen appears.
FIGURE 2-12 Installation completed successfully screen
16. Click Close.
Post Installation TasksImmediately after installing Trend Micro™ Security for Macintosh, perform the following tasks to ensure that:• the product is working• the product has the newest components• your computer is protected and free from malware and spyware/grayware
2-14
Deploying Trend Micro™ Security for Macintosh
Perform the following tasks:
1. Access the Trend Micro™ Security for Macintosh product console.2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection.3. Check for Internet connectivity by opening a Web browser and try to access:
Http://www.trendmicro.com4. Update the product using Update Now.5. Scan your computer for malware and spyware/grayware using Scan Now.
2-15
Chapter 3
Deploying Settings
This chapter describes how to deploy Trend Micro™ Security for Macintosh basic configuration settings to endpoint computers.
This chapter discusses the following topics:• Deploying Settings on page 3-2
3-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
Deploying Settings Individual settings can be modified from the administrator’s computer and deployed to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these procedures.
To deploy the settings:
• Step 1: Configure Settings on page 3-3• Step 2: Stop the Trend Micro™ Security for Macintosh Process on page 3-10• Step 3: Copy Settings on page 3-14• Step 4: Restart Endpoint Computers on page 3-16
3-2
Deploying Settings
Step 1: Configure SettingsConfigure the baseline settings from the administrator’s computer before deploying to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these settings.
Configure the following settings from the administrator’s computer for deployment:
Note: Only these settings can be deployed to endpoint computers.
• Web Protection• Web Threat Protection settings
FIGURE 3-1 Web Threat Protection screen
3-3
Trend Micro™ Security for Macintosh Remote Deployment Guide
• Approved Websites
FIGURE 3-2 Approved Websites screen
3-4
Deploying Settings
• Scan Settings• Real-time Scan settings
FIGURE 3-3 Real-time Scan settings screen
3-5
Trend Micro™ Security for Macintosh Remote Deployment Guide
• Manual Scan settings
FIGURE 3-4 Manual Scan settings screen
3-6
Trend Micro™ Security for Macintosh Remote Deployment Guide
• Exception List
FIGURE 3-6 Exception List screen
3-8
Trend Micro™ Security for Macintosh Remote Deployment Guide
• Proxy Settings
FIGURE 3-8 Proxy Settings screen
Step 2: Stop the Trend Micro™ Security for Macintosh Process
Stop the Trend Micro™ Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop™.
To stop the Trend Micro™ Security for Macintosh process:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.
3-10
Deploying Settings
2. Select the endpoint computers to deploy to in Apple Remote Desktop.
FIGURE 3-9 Apple Remote Desktop screen
3. Click UNIX. The Send UNIX Command screen appears.
3-11
Trend Micro™ Security for Macintosh Remote Deployment Guide
4. Type the following UNIX command:
sudo SystemStarter stop TmccCore
FIGURE 3-10 The Send UNIX Command screen
5. Select User and type root under Run Command as.6. (Optional) Click Save to save this command for deployment to new computers
installed in the network.
3-12
Deploying Settings
7. Click Send. The Send UNIX Command processing request screen appears.
FIGURE 3-11 Send UNIX Command processing request screen
3-13
Trend Micro™ Security for Macintosh Remote Deployment Guide
8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.
FIGURE 3-12 Successfully stopped process screen
Step 3: Copy SettingsCopy the settings from the administrator’s computer to the endpoint computers using Apple Remote Desktop.
To copy the settings:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers to deploy to in Apple Remote Desktop.
3-14
Deploying Settings
3. Click Copy. The Copy Items screen appears.
FIGURE 3-13 The Copy Items screen
4. Select the tmcccore.conf.plist and tmccmac.com.plist files from the .../Library/Application Support/TrendMicro/common/conf folder.
5. Select Same relative location beside Place items in.6. Select Replace the item beside If an item already exists.7. Select Inherit from destination folder beside Set item ownership to.
3-15
Trend Micro™ Security for Macintosh Remote Deployment Guide
8. (Optional) Click Save to save this command for deployment to new machines installed in the network.
9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer.10. Verify that the setting deployment was successful. The Copy Items: Succeeded on
all appears or Successful appears under Task Status for the selected endpoints.
FIGURE 3-14 Successfully copied items screen
Step 4: Restart Endpoint ComputersRestart endpoint computers to ensure that the settings have been deployed.
To restart endpoint computers:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.
3-16
Deploying Settings
2. Select Manage from the Apple Remote Desktop application menu.
FIGURE 3-15 Apple Remote Desktop application menu
3-17
Trend Micro™ Security for Macintosh Remote Deployment Guide
3. Select Restart. The Restart Computers screen appears.
FIGURE 3-16 Restart Computers screen
4. Select the endpoint computers to restart.5. Click Restart. Apple Remote Desktop remotely restarts endpoint computers.
3-18
Deploying Settings
6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.
FIGURE 3-17 Restart Computers: Succeeded screen
3-19
Chapter 4
Uninstalling Trend Micro™ Security for Macintosh
This chapter describes the Trend Micro™ Security for Macintosh uninstallation.
This chapter discusses the following topics:• Uninstalling Trend Micro™ Security for Macintosh on page 4-2
4-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
Uninstalling Trend Micro™ Security for MacintoshThe process of uninstalling Trend Micro™ Security for Macintosh is similar to the uninstallation process for other Macintosh™ software.
There are two ways to uninstall Trend Micro™ Security for Macintosh:• Using Apple Remote Desktop™• Uninstalling manually from the local machine
Using Apple Remote DesktopUse this process to uninstall remotely from one or several computers.
To uninstall using Apple Remote Desktop:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers for uninstallation.
4-2
Uninstalling Trend Micro™ Security for Macintosh
3. Click UNIX. The Send UNIX Command screen opens.
FIGURE 4-1 Remote Desktop screen
4-3
Trend Micro™ Security for Macintosh Remote Deployment Guide
4. Type the following UNIX command:
/Library/Application\ Support/TrendMicro/uninstall/uninstall.sh
FIGURE 4-2 Send UNIX Command screen
5. Select User and type root under Run Command as.6. (Optional) Click Save to save this command for deployment to computers in the
network.
4-4
Uninstalling Trend Micro™ Security for Macintosh
7. Click Send. The Send UNIX Command processing request screen appears.
FIGURE 4-3 Processing computer uninstallation screen
4-5
Trend Micro™ Security for Macintosh Remote Deployment Guide
8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected endpoints.
FIGURE 4-4 Successfully uninstalled program screen
4-6
Uninstalling Trend Micro™ Security for Macintosh
Local UninstallationUse this process to uninstall from a single computer in the network.
To manually uninstall Trend Micro™ Security for Macintosh:
1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears.
FIGURE 4-5 Trend Micro™ Security for Macintosh files included in the disk image
4-7
Trend Micro™ Security for Macintosh Remote Deployment Guide
2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears.
FIGURE 4-6 Confirm uninstallation popup
3. Click Uninstall. The password confirmation popup appears.
FIGURE 4-7 Password confirmation popup
4. Type the Name and Password.
Note: The name and password need to have the appropriate administrative credentials to continue with the uninstallation.
4-8
Uninstalling Trend Micro™ Security for Macintosh
5. Click OK. The uninstallation process begins.
FIGURE 4-8 Uninstalling Trend Micro Security screen
6. If uninstallation is successful, an Uninstallation Completed screen will appear.
FIGURE 4-9 Uninstallation completed screen
7. Click OK.
4-9
Chapter 5
Frequently Asked Questions
This chapter presents and answers frequently asked questions about Trend Micro™ Security for Macintosh.
This chapter discusses the following topics:• Frequently Asked Questions on page 5-2
5-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
Frequently Asked QuestionsInstallationWhy do I receive a warning when I install Trend Micro™ Security for Macintosh on OS™ X version 10.4.11 or 10.5.5 or lower?
Trend Micro™ Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard). • If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend
Micro™ Security for Macintosh on a version of Tiger lower than 10.4.11. • If you are using the Leopard version of the Mac OS X (10.5), you can install Trend
Micro™ Security for Macintosh on versions of Leopard that are less than 10.5.5. However, Trend Micro™ Security for Macintosh will issue a warning.
Tip: Trend Micro recommends using the latest version of the Mac operating system.
UninstallationWhy does no popup window appear when I try to uninstall Trend Micro™ Security for Macintosh?
When you attempt to uninstall Trend Micro™ Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your administrator credentials anytime within the previous 5 minutes, Trend Micro™ Security for Macintosh will remember them and the uninstallation program will not require you to provide the credentials again.
What do I do if I receive an uninstall failed message?
1. Restart your computer.2. Reinstall Trend Micro™ Security for Macintosh.3. Use the uninstall tool to uninstall Trend Micro™ Security for Macintosh.
5-2
Frequently Asked Questions
CompatibilityWhat do I do if my computer performance decreases after installing Trend Micro™ Security for Macintosh?
Check if there are other antivirus products installed on your computer. Some antivirus products are not compatible with Trend Micro™ Security for Macintosh. To determine if Trend Micro™ Security for Macintosh is causing the performance problem, use the Activity Monitor to identify and close applications that display high resource usage. If the problem persists after closing the other applications, contact your support provider.
5-3
Chapter 6
Getting Support
Trend Micro is committed to providing service and support that exceeds our users’ expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support.
This chapter discusses the following topics:• Contacting Technical Support on page 6-2• Sending Infected File Samples on page 6-3• Introducing TrendLabs on page 6-3• Other Useful Resources on page 6-4
6-1
Trend Micro™ Security for Macintosh Remote Deployment Guide
Contacting Technical SupportBefore contacting technical support, here are two things you can quickly do to try and find a solution to your questions:• Check your documentation: the FAQ section of this User’s Guide and Online Help
provide comprehensive information about Trend Micro™ Security for Macintosh.Search both documents to see if they contain your solution.
• Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro productsThe support Web site has answers to previous user inquiries. To search the Knowledge Base, visit http://esupport.trendmicro.com/support
In addition to phone support, Trend Micro provides the following resources:• Email support
• Readme: late-breaking product news, installation instructions, known issues, and version specific information
• Product updates and patches http://www.trendmicro.com/download/
To locate the Trend Micro office nearest you, open a Web browser to the following URL:http://www.trendmicro.com/en/about/contact/overview.htm
To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can:• Version• Exact text of the error message, if any• Steps to reproduce the problem
6-2
Getting Support
Sending Infected File SamplesYou can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address:http://subwiz.trendmicro.com/SubWiz/Default.asp
Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain.
Introducing TrendLabsTrend Micro TrendLabsSM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world.
Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world.
For more information about TrendLabs, please visit:www.trendmicro.com/en/security/trendlabs/overview.htm
6-3
Trend Micro™ Security for Macintosh Remote Deployment Guide
Other Useful ResourcesTrend Micro offers a host of services through its Web site, www.trendmicro.com.
Internet-based tools and services include:• Virus Map: monitors virus incidents around the world• Virus risk assessment: the Trend Micro online virus protection assessment program
for corporate networks
6-4
Index
AApple Remote Desktop 2-3, 3-10, 4-2Audience viBBaseline settings 3-3
CCopy Items 3-15Copy Settings 3-14
DDeployment 2-3DMG Image 2-6Document
document conventions viiDocument Conventions viiDocument Feedback 1-iiDocumentation
audience vi
FFAQs 5-2
Compatibility 5-3Installation 5-2Uninstallation 5-2
Features and Benefits 1-3Feedback 1-ii
HHelp Icon vi
IInstallation
dmg image 2-6local 2-6manual 2-6post installation 2-14pre-installation 2-2remote 2-3success 2-5
Installation Program 2-8
Interfaceprotection status 1-2
LLicense Agreement 2-10Logs 1-4
MMalware Protection 1-3
NNotifications 1-4
PPost Installation Tasks 2-14Pre-installation Considerations 2-2
RRemote Desktop 2-3, 3-10, 4-2Restart 3-16
SSend UNIX Command 3-11Software License Agreement 2-10System Requirements
about 2-2hardware 2-2software 2-2
TTmcccore.conf.plist 3-15Tmccmac.com.plist 3-15Trademarks 1-i
UUninstallation 4-1–4-2
local 4-7manual 4-7remote 4-2
UNIX Command 3-12, 4-4
WWeb Protection 1-4
IN–1