Trend Micro Incorporated reserves the right to make...

70

Transcript of Trend Micro Incorporated reserves the right to make...

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at:

http://www.trendmicro.com/download

Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners.

Copyright© 2009 Trend Micro Incorporated. All rights reserved.

Document Part No. ACEM14037/90306

Release Date: April 2009

Patents Pending

The Trend Micro™ Security for Macintosh user documentation contains product feature information, installation, deployment, and uninstallation instructions for your production environment. You should read the documentation prior to installing or using the software.

Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s Web site at:

http://esupport.trendmicro.com/default.aspx

Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:

http://www.trendmicro.com/download/documentation/rating.asp

ContentsPreface

Trend Micro™ Security for Macintosh Documentation .................................viAudience ..............................................................................................................viDocument Conventions ..................................................................................vii

Chapter 1: Introducing Trend Micro™ Security for MacintoshIntroducing Trend Micro™ Security for Macintosh ..................................... 1-2Features and Benefits ..................................................................................... 1-3Malware Protection ......................................................................................... 1-3Web Protection ............................................................................................... 1-4Logs ................................................................................................................... 1-4Notifications .................................................................................................... 1-4

Chapter 2: Deploying Trend Micro™ Security for MacintoshSystem Requirements ..................................................................................... 2-2Pre-Installation Considerations .................................................................... 2-2Deploying Trend Micro™ Security for Macintosh ....................................... 2-3Local Installation ............................................................................................. 2-6Post Installation Tasks ................................................................................. 2-14

Chapter 3: Deploying SettingsDeploying Settings .......................................................................................... 3-2

Step 1: Configure Settings ........................................................................ 3-3Step 2: Stop the Trend Micro™ Security for Macintosh Process ........ 3-10Step 3: Copy Settings ............................................................................... 3-14Step 4: Restart Endpoint Computers .................................................... 3-16

Chapter 4: Uninstalling Trend Micro™ Security for MacintoshUninstalling Trend Micro™ Security for Macintosh .................................... 4-2

Using Apple Remote Desktop ................................................................. 4-2Local Uninstallation ................................................................................... 4-7

iii

Trend Micro™ Security for Macintosh Remote Deployment Guide

Chapter 5: Frequently Asked QuestionsFrequently Asked Questions .........................................................................5-2

Chapter 6: Getting SupportContacting Technical Support .......................................................................6-2Sending Infected File Samples ......................................................................6-3Introducing TrendLabs ..................................................................................6-3Other Useful Resources .................................................................................6-4

Index

iv

Preface

Preface

Welcome to the Trend Micro™ Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels.

This chapter discusses the following topics: • Trend Micro™ Security for Macintosh Documentation on page vi• Audience on page vi• Document Conventions on page vii

v

Trend Micro™ Security for Macintosh Remote Deployment Guide

Trend Micro™ Security for Macintosh Documentation

The Trend Micro™ Security for Macintosh documentation consists of the following:

Help—Helps you configure product features through the user interface. You can access

the help by opening the product console and then clicking the help icon .

User’s Guide—Helps you plan for deployment and configure product settings.

Remote Deployment Guide—Helps you deploy product and configurations remotely

Read Me File—Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history.

The product documents are available at:

http://www.trendmicro.com/download

AudienceTrend Micro™ Security for Macintosh documentation is written for IT managers and end-users. The documentation assumes that the reader has experience working with Apple™ Macintosh™ computers and has basic experience installing and using software applications for Macintosh computers.

vi

Document ConventionsTo help you locate and interpret information easily, the Trend Micro™ Security for Macintosh documentation uses the following conventions.

TABLE 2-1. Document Conventions

CONVENTION DESCRIPTION

ALL CAPITALS ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY-BOARD

Bold Menus and menu commands, command buttons, tabs, options, and Trend Micro™ Security for Mac-intosh tasks

Italics References to other documentation

Monospace Examples, sample command lines, program code, Web URL, file name, and program output

Note:Configuration notes

Tip: Recommendations

WARNING!Reminders on actions or configurations that should be avoided

vii

Trend Micro™ Security for Macintosh Remote Deployment Guide

viii

Chapter 1

Introducing Trend Micro™ Security for Macintosh

This chapter introduces Trend Micro™ Security for Macintosh and provides a brief description of its components and a list of features and benefits.

This chapter discusses the following topics:• Introducing Trend Micro™ Security for Macintosh on page 1-2• Features and Benefits on page 1-3• Malware Protection on page 1-3• Web Protection on page 1-4• Logs on page 1-4• Notifications on page 1-4

1-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

Introducing Trend Micro™ Security for MacintoshTrend Micro™ Security for Macintosh is a security client designed specifically for Mac OS™ X. Trend Micro™ Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro™ Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware.

FIGURE 1-1 Trend Micro™ Security for Macintosh Protection Status screen

1-2

Introducing Trend Micro™ Security for Macintosh

Features and BenefitsTrend Micro™ Security for Macintosh provides the following features and benefits:

Comprehensive Malware Protection

Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge.

Complete Web Protection

Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings.

Simple Installation

Trend Micro™ Security for Macintosh provides a wizard-type installation program, tmsminstall.mpkg that allows users to install the product on a single computer. You can also use Apple Remote Desktop™ for easy installation on several computers.

Easy to Use Product Console

The Trend Micro™ Security for Macintosh product console provides quick access to the most commonly used security features and settings.

Instant and Informative Notifications

Configure Trend Micro™ Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end.

Malware ProtectionMalware Protection provides three scan methods to protect users from malware. Enable Real-time Scan to have the Trend Micro™ Security for Macintosh scan for malware when opening, closing, saving, and downloading files. Scan for malware and other threats on demand with Manual Scan. Configure Scheduled Scan to scan for malware at regularly scheduled intervals.

1-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

Web ProtectionWeb Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware.

LogsTo provide current information about the security of your computer, Trend Micro™ Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly.

NotificationsConfigure Trend Micro™ Security for Macintosh to display notifications in response to program events and security events. Program events such as scans and updates, and security events such as malware detections, Web site violations, and Web threat detections.

1-4

Chapter 2

Deploying Trend Micro™ Security for Macintosh

This chapter describes the requirements and process for deploying Trend Micro™ Security for Macintosh. This chapter also includes a list of post installation tasks.

This chapter discusses the following topics:• System Requirements on page 2-2• Pre-Installation Considerations on page 2-2• Deploying Trend Micro™ Security for Macintosh on page 2-3• Local Installation on page 2-6• Post Installation Tasks on page 2-14

2-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

System RequirementsTo run the Trend Micro™ Security for Macintosh, your computer must meet the following requirements:

Hardware:• Macintosh™ computer with PowerPC™ and Intel™ core processor• 256MB RAM• 100MB available hard disk space

Software:• Mac OS™ X version 10.4.11 (Tiger) or higher• Mac OS™ X version 10.5.5 (Leopard) or higher• Apple Remote Desktop™

The Trend Micro™ Security for Macintosh needs an Internet connection to perform the following tasks:• Download product and component updates• Obtain virus information• Browse Web pages on the Trend Micro Web site.

Pre-Installation ConsiderationsTo ensure a successful installation and operation of Trend Micro™ Security for Macintosh, check for and uninstall other installed antivirus and anti-spyware products before installing Trend Micro™ Security for Macintosh.

Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation.

2-2

Deploying Trend Micro™ Security for Macintosh

Deploying Trend Micro™ Security for MacintoshThe process of installing Trend Micro™ Security for Macintosh on several computers can be simplified by using Apple Remote Desktop.

To deploy Trend Micro™ Security for Macintosh to endpoint computers:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers to deploy to in Apple Remote Desktop.

FIGURE 2-1 Remote Desktop screen

3. Click Install. The Install Packages screen appears.

2-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

4. Drag the Trend Micro™ Security for Macintosh installer package on this screen. Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages.

FIGURE 2-2 Install Packages screen

5. (Optional) Click Save to save this task for deployment to new machines installed in the network.

6. Click Install. The Remote Desktop starts installing the package to the selected endpoints.

2-4

Deploying Trend Micro™ Security for Macintosh

7. Verify that the installation was successful. The message Install Packages: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.

FIGURE 2-3 Successful installation screen

2-5

Trend Micro™ Security for Macintosh Remote Deployment Guide

Local InstallationThe process of installing Trend Micro™ Security for Macintosh on a single computer is similar to the installation process for other Macintosh™ software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file.

To install Trend Micro™ Security for Macintosh:

1. Uninstall other security software products.

Note: Disabling or uninstalling your antivirus and security products can make your computer susceptible to threats. Carefully plan installation or uninstallation and perform manual scan immediately after installation.

2-6

Deploying Trend Micro™ Security for Macintosh

2. Double-click the Trend Micro Security for Macintosh Standalone-1.0.xxx.dmg file. The files included in the disk image appears.

FIGURE 2-4 Trend Micro™ Security for Macintosh files included in the disk image

2-7

Trend Micro™ Security for Macintosh Remote Deployment Guide

3. Double-click the Install Trend Micro Security Standalone icon to launch the installation program. The confirmation message appears.

FIGURE 2-5 Confirm installation popup

4. Click Continue. The Introduction screen appears.

FIGURE 2-6 Introduction screen

2-8

Deploying Trend Micro™ Security for Macintosh

5. Click Continue. The Important Information screen appears.

FIGURE 2-7 Important Information screen

6. Read the Read Me file.

2-9

Trend Micro™ Security for Macintosh Remote Deployment Guide

7. Click Continue. The Software License Agreement screen appears.

8. Read the License agreement. 9. Click Continue. The confirmation message appears.

FIGURE 2-8 Continue installation popup

2-10

Deploying Trend Micro™ Security for Macintosh

10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears.

11. Click Agree. The Standard Install screen appears.

FIGURE 2-9 Standard install screen

2-11

Trend Micro™ Security for Macintosh Remote Deployment Guide

12. Click Install to accept the default installation or click Change Install Location to select a different location. The password confirmation popup appears.

FIGURE 2-10 Password confirmation popup

13. Type the Name and Password.

Note: The name and password need to have the appropriate administrative credentials to continue with the installation.

2-12

Deploying Trend Micro™ Security for Macintosh

14. Click OK. The installation process begins.

FIGURE 2-11 Installing Trend Micro Security screen

2-13

Trend Micro™ Security for Macintosh Remote Deployment Guide

15. If the installation is successful, the Installation completed successfully screen appears.

FIGURE 2-12 Installation completed successfully screen

16. Click Close.

Post Installation TasksImmediately after installing Trend Micro™ Security for Macintosh, perform the following tasks to ensure that:• the product is working• the product has the newest components• your computer is protected and free from malware and spyware/grayware

2-14

Deploying Trend Micro™ Security for Macintosh

Perform the following tasks:

1. Access the Trend Micro™ Security for Macintosh product console.2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection.3. Check for Internet connectivity by opening a Web browser and try to access:

Http://www.trendmicro.com4. Update the product using Update Now.5. Scan your computer for malware and spyware/grayware using Scan Now.

2-15

Trend Micro™ Security for Macintosh Remote Deployment Guide

2-16

Chapter 3

Deploying Settings

This chapter describes how to deploy Trend Micro™ Security for Macintosh basic configuration settings to endpoint computers.

This chapter discusses the following topics:• Deploying Settings on page 3-2

3-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

Deploying Settings Individual settings can be modified from the administrator’s computer and deployed to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these procedures.

To deploy the settings:

• Step 1: Configure Settings on page 3-3• Step 2: Stop the Trend Micro™ Security for Macintosh Process on page 3-10• Step 3: Copy Settings on page 3-14• Step 4: Restart Endpoint Computers on page 3-16

3-2

Deploying Settings

Step 1: Configure SettingsConfigure the baseline settings from the administrator’s computer before deploying to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these settings.

Configure the following settings from the administrator’s computer for deployment:

Note: Only these settings can be deployed to endpoint computers.

• Web Protection• Web Threat Protection settings

FIGURE 3-1 Web Threat Protection screen

3-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

• Approved Websites

FIGURE 3-2 Approved Websites screen

3-4

Deploying Settings

• Scan Settings• Real-time Scan settings

FIGURE 3-3 Real-time Scan settings screen

3-5

Trend Micro™ Security for Macintosh Remote Deployment Guide

• Manual Scan settings

FIGURE 3-4 Manual Scan settings screen

3-6

Deploying Settings

• Scheduled Scan settings

FIGURE 3-5 Scheduled Scan settings screen

3-7

Trend Micro™ Security for Macintosh Remote Deployment Guide

• Exception List

FIGURE 3-6 Exception List screen

3-8

Deploying Settings

• Update settings• AutoUpdate settings

FIGURE 3-7 Auto Update screen

3-9

Trend Micro™ Security for Macintosh Remote Deployment Guide

• Proxy Settings

FIGURE 3-8 Proxy Settings screen

Step 2: Stop the Trend Micro™ Security for Macintosh Process

Stop the Trend Micro™ Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop™.

To stop the Trend Micro™ Security for Macintosh process:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.

3-10

Deploying Settings

2. Select the endpoint computers to deploy to in Apple Remote Desktop.

FIGURE 3-9 Apple Remote Desktop screen

3. Click UNIX. The Send UNIX Command screen appears.

3-11

Trend Micro™ Security for Macintosh Remote Deployment Guide

4. Type the following UNIX command:

sudo SystemStarter stop TmccCore

FIGURE 3-10 The Send UNIX Command screen

5. Select User and type root under Run Command as.6. (Optional) Click Save to save this command for deployment to new computers

installed in the network.

3-12

Deploying Settings

7. Click Send. The Send UNIX Command processing request screen appears.

FIGURE 3-11 Send UNIX Command processing request screen

3-13

Trend Micro™ Security for Macintosh Remote Deployment Guide

8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.

FIGURE 3-12 Successfully stopped process screen

Step 3: Copy SettingsCopy the settings from the administrator’s computer to the endpoint computers using Apple Remote Desktop.

To copy the settings:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers to deploy to in Apple Remote Desktop.

3-14

Deploying Settings

3. Click Copy. The Copy Items screen appears.

FIGURE 3-13 The Copy Items screen

4. Select the tmcccore.conf.plist and tmccmac.com.plist files from the .../Library/Application Support/TrendMicro/common/conf folder.

5. Select Same relative location beside Place items in.6. Select Replace the item beside If an item already exists.7. Select Inherit from destination folder beside Set item ownership to.

3-15

Trend Micro™ Security for Macintosh Remote Deployment Guide

8. (Optional) Click Save to save this command for deployment to new machines installed in the network.

9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer.10. Verify that the setting deployment was successful. The Copy Items: Succeeded on

all appears or Successful appears under Task Status for the selected endpoints.

FIGURE 3-14 Successfully copied items screen

Step 4: Restart Endpoint ComputersRestart endpoint computers to ensure that the settings have been deployed.

To restart endpoint computers:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.

3-16

Deploying Settings

2. Select Manage from the Apple Remote Desktop application menu.

FIGURE 3-15 Apple Remote Desktop application menu

3-17

Trend Micro™ Security for Macintosh Remote Deployment Guide

3. Select Restart. The Restart Computers screen appears.

FIGURE 3-16 Restart Computers screen

4. Select the endpoint computers to restart.5. Click Restart. Apple Remote Desktop remotely restarts endpoint computers.

3-18

Deploying Settings

6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected endpoints.

FIGURE 3-17 Restart Computers: Succeeded screen

3-19

Trend Micro™ Security for Macintosh Remote Deployment Guide

3-20

Chapter 4

Uninstalling Trend Micro™ Security for Macintosh

This chapter describes the Trend Micro™ Security for Macintosh uninstallation.

This chapter discusses the following topics:• Uninstalling Trend Micro™ Security for Macintosh on page 4-2

4-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

Uninstalling Trend Micro™ Security for MacintoshThe process of uninstalling Trend Micro™ Security for Macintosh is similar to the uninstallation process for other Macintosh™ software.

There are two ways to uninstall Trend Micro™ Security for Macintosh:• Using Apple Remote Desktop™• Uninstalling manually from the local machine

Using Apple Remote DesktopUse this process to uninstall remotely from one or several computers.

To uninstall using Apple Remote Desktop:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.2. Select the endpoint computers for uninstallation.

4-2

Uninstalling Trend Micro™ Security for Macintosh

3. Click UNIX. The Send UNIX Command screen opens.

FIGURE 4-1 Remote Desktop screen

4-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

4. Type the following UNIX command:

/Library/Application\ Support/TrendMicro/uninstall/uninstall.sh

FIGURE 4-2 Send UNIX Command screen

5. Select User and type root under Run Command as.6. (Optional) Click Save to save this command for deployment to computers in the

network.

4-4

Uninstalling Trend Micro™ Security for Macintosh

7. Click Send. The Send UNIX Command processing request screen appears.

FIGURE 4-3 Processing computer uninstallation screen

4-5

Trend Micro™ Security for Macintosh Remote Deployment Guide

8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected endpoints.

FIGURE 4-4 Successfully uninstalled program screen

4-6

Uninstalling Trend Micro™ Security for Macintosh

Local UninstallationUse this process to uninstall from a single computer in the network.

To manually uninstall Trend Micro™ Security for Macintosh:

1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears.

FIGURE 4-5 Trend Micro™ Security for Macintosh files included in the disk image

4-7

Trend Micro™ Security for Macintosh Remote Deployment Guide

2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears.

FIGURE 4-6 Confirm uninstallation popup

3. Click Uninstall. The password confirmation popup appears.

FIGURE 4-7 Password confirmation popup

4. Type the Name and Password.

Note: The name and password need to have the appropriate administrative credentials to continue with the uninstallation.

4-8

Uninstalling Trend Micro™ Security for Macintosh

5. Click OK. The uninstallation process begins.

FIGURE 4-8 Uninstalling Trend Micro Security screen

6. If uninstallation is successful, an Uninstallation Completed screen will appear.

FIGURE 4-9 Uninstallation completed screen

7. Click OK.

4-9

Trend Micro™ Security for Macintosh Remote Deployment Guide

4-10

Chapter 5

Frequently Asked Questions

This chapter presents and answers frequently asked questions about Trend Micro™ Security for Macintosh.

This chapter discusses the following topics:• Frequently Asked Questions on page 5-2

5-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

Frequently Asked QuestionsInstallationWhy do I receive a warning when I install Trend Micro™ Security for Macintosh on OS™ X version 10.4.11 or 10.5.5 or lower?

Trend Micro™ Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard). • If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend

Micro™ Security for Macintosh on a version of Tiger lower than 10.4.11. • If you are using the Leopard version of the Mac OS X (10.5), you can install Trend

Micro™ Security for Macintosh on versions of Leopard that are less than 10.5.5. However, Trend Micro™ Security for Macintosh will issue a warning.

Tip: Trend Micro recommends using the latest version of the Mac operating system.

UninstallationWhy does no popup window appear when I try to uninstall Trend Micro™ Security for Macintosh?

When you attempt to uninstall Trend Micro™ Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your administrator credentials anytime within the previous 5 minutes, Trend Micro™ Security for Macintosh will remember them and the uninstallation program will not require you to provide the credentials again.

What do I do if I receive an uninstall failed message?

1. Restart your computer.2. Reinstall Trend Micro™ Security for Macintosh.3. Use the uninstall tool to uninstall Trend Micro™ Security for Macintosh.

5-2

Frequently Asked Questions

CompatibilityWhat do I do if my computer performance decreases after installing Trend Micro™ Security for Macintosh?

Check if there are other antivirus products installed on your computer. Some antivirus products are not compatible with Trend Micro™ Security for Macintosh. To determine if Trend Micro™ Security for Macintosh is causing the performance problem, use the Activity Monitor to identify and close applications that display high resource usage. If the problem persists after closing the other applications, contact your support provider.

5-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

5-4

Chapter 6

Getting Support

Trend Micro is committed to providing service and support that exceeds our users’ expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support.

This chapter discusses the following topics:• Contacting Technical Support on page 6-2• Sending Infected File Samples on page 6-3• Introducing TrendLabs on page 6-3• Other Useful Resources on page 6-4

6-1

Trend Micro™ Security for Macintosh Remote Deployment Guide

Contacting Technical SupportBefore contacting technical support, here are two things you can quickly do to try and find a solution to your questions:• Check your documentation: the FAQ section of this User’s Guide and Online Help

provide comprehensive information about Trend Micro™ Security for Macintosh.Search both documents to see if they contain your solution.

• Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro productsThe support Web site has answers to previous user inquiries. To search the Knowledge Base, visit http://esupport.trendmicro.com/support

In addition to phone support, Trend Micro provides the following resources:• Email support

[email protected]

• Readme: late-breaking product news, installation instructions, known issues, and version specific information

• Product updates and patches http://www.trendmicro.com/download/

To locate the Trend Micro office nearest you, open a Web browser to the following URL:http://www.trendmicro.com/en/about/contact/overview.htm

To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can:• Version• Exact text of the error message, if any• Steps to reproduce the problem

6-2

Getting Support

Sending Infected File SamplesYou can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address:http://subwiz.trendmicro.com/SubWiz/Default.asp

Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain.

Introducing TrendLabsTrend Micro TrendLabsSM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world.

Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world.

For more information about TrendLabs, please visit:www.trendmicro.com/en/security/trendlabs/overview.htm

6-3

Trend Micro™ Security for Macintosh Remote Deployment Guide

Other Useful ResourcesTrend Micro offers a host of services through its Web site, www.trendmicro.com.

Internet-based tools and services include:• Virus Map: monitors virus incidents around the world• Virus risk assessment: the Trend Micro online virus protection assessment program

for corporate networks

6-4

Index

AApple Remote Desktop 2-3, 3-10, 4-2Audience vi

BBaseline settings 3-3

CCopy Items 3-15Copy Settings 3-14

DDeployment 2-3DMG Image 2-6Document

document conventions viiDocument Conventions viiDocument Feedback 1-iiDocumentation

audience vi

FFAQs 5-2

Compatibility 5-3Installation 5-2Uninstallation 5-2

Features and Benefits 1-3Feedback 1-ii

HHelp Icon vi

IInstallation

dmg image 2-6local 2-6manual 2-6post installation 2-14pre-installation 2-2remote 2-3success 2-5

Installation Program 2-8

Interfaceprotection status 1-2

LLicense Agreement 2-10Logs 1-4

MMalware Protection 1-3

NNotifications 1-4

PPost Installation Tasks 2-14Pre-installation Considerations 2-2

RRemote Desktop 2-3, 3-10, 4-2Restart 3-16

SSend UNIX Command 3-11Software License Agreement 2-10System Requirements

about 2-2hardware 2-2software 2-2

TTmcccore.conf.plist 3-15Tmccmac.com.plist 3-15Trademarks 1-i

UUninstallation 4-1–4-2

local 4-7manual 4-7remote 4-2

UNIX Command 3-12, 4-4

WWeb Protection 1-4

IN–1

Trend Micro™ Security for Macintosh Remote Deployment Guide

IN–2