documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download
Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners.
Copyright© 2009 Trend Micro Incorporated. All rights reserved. Document Part No. ACEM14037/90306
Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s Web site at: http://esupport.trendmicro.com/default.aspx
Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:
Preface
Trend Micro™ Security for Macintosh Documentation ...vi Audience ...vi Document Conventions ...vii
Chapter 1:
Introducing Trend Micro™ Security for Macintosh
Introducing Trend Micro™ Security for Macintosh ... 1-2 Features and Benefits ... 1-3 Malware Protection ... 1-3 Web Protection ... 1-4 Logs ... 1-4 Notifications ... 1-4
Chapter 2:
Deploying Trend Micro™ Security for Macintosh
System Requirements ... 2-2 Pre-Installation Considerations ... 2-2 Deploying Trend Micro™ Security for Macintosh ... 2-3 Local Installation ... 2-6 Post Installation Tasks ... 2-14
Chapter 3:
Deploying Settings
Deploying Settings ... 3-2 Step 1: Configure Settings ... 3-3 Step 2: Stop the Trend Micro™ Security for Macintosh Process ... 3-10 Step 3: Copy Settings ... 3-14 Step 4: Restart Endpoint Computers ... 3-16
Chapter 4:
Uninstalling Trend Micro™ Security for Macintosh
Chapter 5:
Frequently Asked Questions
Frequently Asked Questions ...5-2
Chapter 6:
Getting Support
Preface
Welcome to the Trend Micro™ Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels. This chapter discusses the following topics:
• Trend Micro™ Security for Macintosh Documentation on page vi • Audience on page vi
Trend Micro™ Security for Macintosh
Documentation
The Trend Micro™ Security for Macintosh documentation consists of the following:
Help—Helps you configure product features through the user interface. You can access
the help by opening the product console and then clicking the help icon .
User’s Guide—Helps you plan for deployment and configure product settings. Remote Deployment Guide—Helps you deploy product and configurations remotely Read Me File—Contains late-breaking product information that might not be found in
the other documentation. Topics include a description of features, installation tips, known issues, and product release history.
The product documents are available at:
http://www.trendmicro.com/download
Audience
Macintosh documentation uses the following conventions. TABLE 2-1. Document Conventions
CONVENTION DESCRIPTION
ALL CAPITALS ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY-BOARD
Bold Menus and menu commands, command buttons, tabs, options, and Trend Micro™ Security for
Mac-intosh tasks
Italics References to other documentation
Monospace Examples, sample command lines, program code, Web URL, file name, and program output Note: Configuration notes Tip: Recommendations WARNING!
Introducing Trend Micro™ Security
for Macintosh
This chapter introduces Trend Micro™ Security for Macintosh and provides a brief description of its components and a list of features and benefits.
This chapter discusses the following topics:
• Introducing Trend Micro™ Security for Macintosh on page 1-2 • Features and Benefits on page 1-3
• Malware Protection on page 1-3 • Web Protection on page 1-4 • Logs on page 1-4
Introducing Trend Micro™ Security for Macintosh
Trend Micro™ Security for Macintosh is a security client designed specifically for Mac OS™ X. Trend Micro™ Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro™ Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware.Features and Benefits
Trend Micro™ Security for Macintosh provides the following features and benefits:
Comprehensive Malware Protection
Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge.
Complete Web Protection
Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings.
Simple Installation
Trend Micro™ Security for Macintosh provides a wizard-type installation program,
tmsminstall.mpkg that allows users to install the product on a single computer. You
can also use Apple Remote Desktop™ for easy installation on several computers.
Easy to Use Product Console
The Trend Micro™ Security for Macintosh product console provides quick access to the most commonly used security features and settings.
Instant and Informative Notifications
Configure Trend Micro™ Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end.
Malware Protection
Web Protection
Web Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware.
Logs
To provide current information about the security of your computer, Trend Micro™ Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly.
Notifications
Deploying Trend Micro™ Security for
Macintosh
This chapter describes the requirements and process for deploying Trend Micro™ Security for Macintosh. This chapter also includes a list of post installation tasks. This chapter discusses the following topics:
• System Requirements on page 2-2
• Pre-Installation Considerations on page 2-2
• Deploying Trend Micro™ Security for Macintosh on page 2-3 • Local Installation on page 2-6
System Requirements
To run the Trend Micro™ Security for Macintosh, your computer must meet the following requirements:
Hardware:
• Macintosh™ computer with PowerPC™ and Intel™ core processor
• 256MB RAM
• 100MB available hard disk space Software:
• Mac OS™ X version 10.4.11 (Tiger) or higher • Mac OS™ X version 10.5.5 (Leopard) or higher • Apple Remote Desktop™
The Trend Micro™ Security for Macintosh needs an Internet connection to perform the following tasks:
• Download product and component updates • Obtain virus information
• Browse Web pages on the Trend Micro Web site.
Pre-Installation Considerations
To ensure a successful installation and operation of Trend Micro™ Security for
Macintosh, check for and uninstall other installed antivirus and anti-spyware products
before installing Trend Micro™ Security for Macintosh.
Deploying Trend Micro™ Security for Macintosh
The process of installing Trend Micro™ Security for Macintosh on several computers can be simplified by using Apple Remote Desktop.To deploy Trend Micro™ Security for Macintosh to endpoint computers:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.
2. Select the endpoint computers to deploy to in Apple Remote Desktop.
FIGURE2-1 Remote Desktop screen
4. Drag the Trend Micro™ Security for Macintosh installer package on this screen.
Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages.
FIGURE2-2 Install Packages screen
5. (Optional) Click Save to save this task for deployment to new machines installed in
the network.
6. Click Install. The Remote Desktop starts installing the package to the selected
7. Verify that the installation was successful. The message Install Packages:
Succeeded on all appears or Successful appears under Task Status for the selected
endpoints.
Local Installation
The process of installing Trend Micro™ Security for Macintosh on a single computer is similar to the installation process for other Macintosh™ software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file.
To install Trend Micro™ Security for Macintosh:
1. Uninstall other security software products.
2. Double-click the Trend Micro Security for Macintosh
Standalone-1.0.xxx.dmg file. The files included in the disk image appears.
3. Double-click the Install Trend Micro Security Standalone icon to launch the
installation program. The confirmation message appears.
FIGURE2-5 Confirm installation popup
4. Click Continue. The Introduction screen appears.
5. Click Continue. The Important Information screen appears.
FIGURE2-7 Important Information screen
7. Click Continue. The Software License Agreement screen appears.
8. Read the License agreement.
9. Click Continue. The confirmation message appears.
10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears.
11. Click Agree. The Standard Install screen appears.
12. Click Install to accept the default installation or click Change Install Location to
select a different location. The password confirmation popup appears.
FIGURE2-10 Password confirmation popup
13. Type the Name and Password.
14. Click OK. The installation process begins.
15. If the installation is successful, the Installation completed successfully screen
appears.
FIGURE2-12 Installation completed successfully screen
16. Click Close.
Post Installation Tasks
Immediately after installing Trend Micro™ Security for Macintosh, perform the following tasks to ensure that:
• the product is working
• the product has the newest components
Perform the following tasks:
1. Access the Trend Micro™ Security for Macintosh product console.
2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection. 3. Check for Internet connectivity by opening a Web browser and try to access:
Http://www.trendmicro.com
4. Update the product using Update Now.
Deploying Settings
This chapter describes how to deploy Trend Micro™ Security for Macintosh basic configuration settings to endpoint computers.
Deploying Settings
Individual settings can be modified from the administrator’s computer and deployed to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these procedures.
To deploy the settings:
• Step 1: Configure Settings on page 3-3
• Step 2: Stop the Trend Micro™ Security for Macintosh Process on page 3-10 • Step 3: Copy Settings on page 3-14
Step 1: Configure Settings
Configure the baseline settings from the administrator’s computer before deploying to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these settings.
Configure the following settings from the administrator’s computer for deployment:
Note: Only these settings can be deployed to endpoint computers. • Web Protection
• Approved Websites
• Scan Settings
• Real-time Scan settings
• Manual Scan settings
• Scheduled Scan settings
• Exception List
• Update settings
• AutoUpdate settings
• Proxy Settings
FIGURE3-8 Proxy Settings screen
Step 2: Stop the Trend Micro™ Security for Macintosh
Process
Stop the Trend Micro™ Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop™.
To stop the Trend Micro™ Security for Macintosh process:
2. Select the endpoint computers to deploy to in Apple Remote Desktop.
FIGURE3-9 Apple Remote Desktop screen
4. Type the following UNIX command:
sudo SystemStarter stop TmccCore
FIGURE3-10 The Send UNIX Command screen
5. Select User and type root under Run Command as.
6. (Optional) Click Save to save this command for deployment to new computers
7. Click Send. The Send UNIX Command processing request screen appears.
8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected
endpoints.
FIGURE3-12 Successfully stopped process screen
Step 3: Copy Settings
Copy the settings from the administrator’s computer to the endpoint computers using Apple Remote Desktop.
To copy the settings:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.
3. Click Copy. The Copy Items screen appears.
FIGURE3-13 The Copy Items screen
8. (Optional) Click Save to save this command for deployment to new machines
installed in the network.
9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer. 10. Verify that the setting deployment was successful. The Copy Items: Succeeded on
all appears or Successful appears under Task Status for the selected endpoints.
FIGURE3-14 Successfully copied items screen
Step 4: Restart Endpoint Computers
Restart endpoint computers to ensure that the settings have been deployed. To restart endpoint computers:
2. Select Manage from the Apple Remote Desktop application menu.
3. Select Restart. The Restart Computers screen appears.
FIGURE3-16 Restart Computers screen
4. Select the endpoint computers to restart.
6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected
endpoints.
Uninstalling Trend Micro™ Security
for Macintosh
This chapter describes the Trend Micro™ Security for Macintosh uninstallation. This chapter discusses the following topics:
Uninstalling Trend Micro™ Security for Macintosh
The process of uninstalling Trend Micro™ Security for Macintosh is similar to the uninstallation process for other Macintosh™ software.There are two ways to uninstall Trend Micro™ Security for Macintosh: • Using Apple Remote Desktop™
• Uninstalling manually from the local machine
Using Apple Remote Desktop
Use this process to uninstall remotely from one or several computers. To uninstall using Apple Remote Desktop:
1. Open Apple Remote Desktop. The Remote Desktop screen appears.
3. Click UNIX. The Send UNIX Command screen opens.
4. Type the following UNIX command:
/Library/Application\ Support/TrendMicro/uninstall/uninstall.sh
FIGURE4-2 Send UNIX Command screen
5. Select User and type root under Run Command as.
6. (Optional) Click Save to save this command for deployment to computers in the
7. Click Send. The Send UNIX Command processing request screen appears.
8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected
endpoints.
Local Uninstallation
Use this process to uninstall from a single computer in the network. To manually uninstall Trend Micro™ Security for Macintosh:
1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears.
2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears.
FIGURE4-6 Confirm uninstallation popup
3. Click Uninstall. The password confirmation popup appears.
FIGURE4-7 Password confirmation popup
4. Type the Name and Password.
5. Click OK. The uninstallation process begins.
FIGURE4-8 Uninstalling Trend Micro Security screen
6. If uninstallation is successful, an Uninstallation Completed screen will appear.
FIGURE4-9 Uninstallation completed screen
Frequently Asked Questions
This chapter presents and answers frequently asked questions about Trend Micro™ Security for Macintosh.
Frequently Asked Questions
Installation
Why do I receive a warning when I install Trend Micro™ Security for Macintosh on OS™ X version 10.4.11 or 10.5.5 or lower?
Trend Micro™ Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard).
• If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend Micro™ Security for Macintosh on a version of Tiger lower than 10.4.11.
• If you are using the Leopard version of the Mac OS X (10.5), you can install Trend Micro™ Security for Macintosh on versions of Leopard that are less than 10.5.5. However, Trend Micro™ Security for Macintosh will issue a warning.
Tip: Trend Micro recommends using the latest version of the Mac operating system.
Uninstallation
Why does no popup window appear when I try to uninstall Trend Micro™ Security for Macintosh?
When you attempt to uninstall Trend Micro™ Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your
administrator credentials anytime within the previous 5 minutes, Trend Micro™ Security
for Macintosh will remember them and the uninstallation program will not require you to
provide the credentials again.
What do I do if I receive an uninstall failed message? 1. Restart your computer.
2. Reinstall Trend Micro™ Security for Macintosh.
Compatibility
What do I do if my computer performance decreases after installing Trend Micro™ Security for Macintosh?
Getting Support
Trend Micro is committed to providing service and support that exceeds our users’ expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support.
Contacting Technical Support
Before contacting technical support, here are two things you can quickly do to try and find a solution to your questions:
• Check your documentation: the FAQ section of this User’s Guide and Online Help provide comprehensive information about Trend Micro™ Security for Macintosh. Search both documents to see if they contain your solution.
• Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro products
The support Web site has answers to previous user inquiries. To search the Knowledge Base, visit
http://esupport.trendmicro.com/support
In addition to phone support, Trend Micro provides the following resources: • Email support
support@trendmicro.com
• Readme: late-breaking product news, installation instructions, known issues, and version specific information
• Product updates and patches
http://www.trendmicro.com/download/
To locate the Trend Micro office nearest you, open a Web browser to the following URL:
http://www.trendmicro.com/en/about/contact/overview.htm
To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can:
• Version
Sending Infected File Samples
You can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address:
http://subwiz.trendmicro.com/SubWiz/Default.asp
Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain.
Introducing TrendLabs
Trend Micro TrendLabsSM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world.
Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world.
For more information about TrendLabs, please visit:
Other Useful Resources
Trend Micro offers a host of services through its Web site, www.trendmicro.com.
Internet-based tools and services include:
• Virus Map: monitors virus incidents around the world
A
Apple Remote Desktop 2-3, 3-10, 4-2 Audience vi B Baseline settings 3-3 C Copy Items 3-15 Copy Settings 3-14 D Deployment 2-3 DMG Image 2-6 Document
document conventions vii Document Conventions vii Document Feedback 1-ii Documentation audience vi F FAQs 5-2 Compatibility 5-3 Installation 5-2 Uninstallation 5-2 Features and Benefits 1-3 Feedback 1-ii H Help Icon vi I Installation dmg image 2-6 local 2-6 manual 2-6 post installation 2-14 protection status 1-2 L License Agreement 2-10 Logs 1-4 M Malware Protection 1-3 N Notifications 1-4 P
Post Installation Tasks 2-14 Pre-installation Considerations 2-2
R
Remote Desktop 2-3, 3-10, 4-2 Restart 3-16
S