• No results found

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

N/A
N/A
Protected

Academic year: 2021

Share "Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice."

Copied!
70
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)
(3)

documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download

Trend Micro, the Trend Micro t-ball logo, TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. Macintosh is a trademark of Apple Inc. All other product or company names may be trademarks or registered trademarks of their owners.

Copyright© 2009 Trend Micro Incorporated. All rights reserved. Document Part No. ACEM14037/90306

(4)

Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s Web site at: http://esupport.trendmicro.com/default.aspx

Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site:

(5)

Preface

Trend Micro™ Security for Macintosh Documentation ...vi Audience ...vi Document Conventions ...vii

Chapter 1:

Introducing Trend Micro™ Security for Macintosh

Introducing Trend Micro™ Security for Macintosh ... 1-2 Features and Benefits ... 1-3 Malware Protection ... 1-3 Web Protection ... 1-4 Logs ... 1-4 Notifications ... 1-4

Chapter 2:

Deploying Trend Micro™ Security for Macintosh

System Requirements ... 2-2 Pre-Installation Considerations ... 2-2 Deploying Trend Micro™ Security for Macintosh ... 2-3 Local Installation ... 2-6 Post Installation Tasks ... 2-14

Chapter 3:

Deploying Settings

Deploying Settings ... 3-2 Step 1: Configure Settings ... 3-3 Step 2: Stop the Trend Micro™ Security for Macintosh Process ... 3-10 Step 3: Copy Settings ... 3-14 Step 4: Restart Endpoint Computers ... 3-16

Chapter 4:

Uninstalling Trend Micro™ Security for Macintosh

(6)

Chapter 5:

Frequently Asked Questions

Frequently Asked Questions ...5-2

Chapter 6:

Getting Support

(7)

Preface

Welcome to the Trend Micro™ Security for Macintosh Remote Deployment Guide. This guide contains information about product installation, settings, and service levels. This chapter discusses the following topics:

• Trend Micro™ Security for Macintosh Documentation on page vi • Audience on page vi

(8)

Trend Micro™ Security for Macintosh

Documentation

The Trend Micro™ Security for Macintosh documentation consists of the following:

Help—Helps you configure product features through the user interface. You can access

the help by opening the product console and then clicking the help icon .

User’s Guide—Helps you plan for deployment and configure product settings. Remote Deployment Guide—Helps you deploy product and configurations remotely Read Me File—Contains late-breaking product information that might not be found in

the other documentation. Topics include a description of features, installation tips, known issues, and product release history.

The product documents are available at:

http://www.trendmicro.com/download

Audience

(9)

Macintosh documentation uses the following conventions. TABLE 2-1. Document Conventions

CONVENTION DESCRIPTION

ALL CAPITALS ACRONYMS, ABBREVIATIONS, AND NAMES OF CERTAIN COMMANDS AND KEYS ON THE KEY-BOARD

Bold Menus and menu commands, command buttons, tabs, options, and Trend Micro™ Security for

Mac-intosh tasks

Italics References to other documentation

Monospace Examples, sample command lines, program code, Web URL, file name, and program output Note: Configuration notes Tip: Recommendations WARNING!

(10)
(11)

Introducing Trend Micro™ Security

for Macintosh

This chapter introduces Trend Micro™ Security for Macintosh and provides a brief description of its components and a list of features and benefits.

This chapter discusses the following topics:

• Introducing Trend Micro™ Security for Macintosh on page 1-2 • Features and Benefits on page 1-3

• Malware Protection on page 1-3 • Web Protection on page 1-4 • Logs on page 1-4

(12)

Introducing Trend Micro™ Security for Macintosh

Trend Micro™ Security for Macintosh is a security client designed specifically for Mac OS™ X. Trend Micro™ Security for Macintosh protects against malware, spyware, and Web threats. Trend Micro™ Security for Macintosh uses the latest Web Threat Protection technology to protect users from fraudulent (phishing) Web sites, and sites that contain malware.

(13)

Features and Benefits

Trend Micro™ Security for Macintosh provides the following features and benefits:

Comprehensive Malware Protection

Powerful protection against viruses, Trojans, worms, spyware, grayware, and new variants as they emerge.

Complete Web Protection

Protects against Web-based malware, data theft, lost productivity, and reputation damage. Blocks access to malicious Web sites based on reputation ratings.

Simple Installation

Trend Micro™ Security for Macintosh provides a wizard-type installation program,

tmsminstall.mpkg that allows users to install the product on a single computer. You

can also use Apple Remote Desktop™ for easy installation on several computers.

Easy to Use Product Console

The Trend Micro™ Security for Macintosh product console provides quick access to the most commonly used security features and settings.

Instant and Informative Notifications

Configure Trend Micro™ Security for Macintosh to notify users when it detects malware and Web threats, when content filtering violations occur, and when updates begin and end.

Malware Protection

(14)

Web Protection

Web Protection uses the Web Threat Protection feature. Web Threat Protection protects users from fraudulent Web sites and Web sites that contain malware.

Logs

To provide current information about the security of your computer, Trend Micro™ Security for Macintosh is pre-configured to generate logs based on malware detections, Web threat detections, and component updates. From the Log screen, click Clear to delete specific logs from the computer. Logs, if not regularly deleted, can consume excessive disk space. Trend Micro recommends deleting logs regularly.

Notifications

(15)

Deploying Trend Micro™ Security for

Macintosh

This chapter describes the requirements and process for deploying Trend Micro™ Security for Macintosh. This chapter also includes a list of post installation tasks. This chapter discusses the following topics:

• System Requirements on page 2-2

• Pre-Installation Considerations on page 2-2

• Deploying Trend Micro™ Security for Macintosh on page 2-3 • Local Installation on page 2-6

(16)

System Requirements

To run the Trend Micro™ Security for Macintosh, your computer must meet the following requirements:

Hardware:

• Macintosh™ computer with PowerPC™ and Intel™ core processor

• 256MB RAM

• 100MB available hard disk space Software:

• Mac OS™ X version 10.4.11 (Tiger) or higher • Mac OS™ X version 10.5.5 (Leopard) or higher • Apple Remote Desktop™

The Trend Micro™ Security for Macintosh needs an Internet connection to perform the following tasks:

• Download product and component updates • Obtain virus information

• Browse Web pages on the Trend Micro Web site.

Pre-Installation Considerations

To ensure a successful installation and operation of Trend Micro™ Security for

Macintosh, check for and uninstall other installed antivirus and anti-spyware products

before installing Trend Micro™ Security for Macintosh.

(17)

Deploying Trend Micro™ Security for Macintosh

The process of installing Trend Micro™ Security for Macintosh on several computers can be simplified by using Apple Remote Desktop.

To deploy Trend Micro™ Security for Macintosh to endpoint computers:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.

2. Select the endpoint computers to deploy to in Apple Remote Desktop.

FIGURE2-1 Remote Desktop screen

(18)

4. Drag the Trend Micro™ Security for Macintosh installer package on this screen.

Alternatively, click "+" to locate the installer package. The Install Trend Micro Security Standalone installer package appears under Packages.

FIGURE2-2 Install Packages screen

5. (Optional) Click Save to save this task for deployment to new machines installed in

the network.

6. Click Install. The Remote Desktop starts installing the package to the selected

(19)

7. Verify that the installation was successful. The message Install Packages:

Succeeded on all appears or Successful appears under Task Status for the selected

endpoints.

(20)

Local Installation

The process of installing Trend Micro™ Security for Macintosh on a single computer is similar to the installation process for other Macintosh™ software. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file.

To install Trend Micro™ Security for Macintosh:

1. Uninstall other security software products.

(21)

2. Double-click the Trend Micro Security for Macintosh

Standalone-1.0.xxx.dmg file. The files included in the disk image appears.

(22)

3. Double-click the Install Trend Micro Security Standalone icon to launch the

installation program. The confirmation message appears.

FIGURE2-5 Confirm installation popup

4. Click Continue. The Introduction screen appears.

(23)

5. Click Continue. The Important Information screen appears.

FIGURE2-7 Important Information screen

(24)

7. Click Continue. The Software License Agreement screen appears.

8. Read the License agreement.

9. Click Continue. The confirmation message appears.

(25)

10. Click Agree if you agree to the terms of the software license agreement. The Standard Install screen appears.

11. Click Agree. The Standard Install screen appears.

(26)

12. Click Install to accept the default installation or click Change Install Location to

select a different location. The password confirmation popup appears.

FIGURE2-10 Password confirmation popup

13. Type the Name and Password.

(27)

14. Click OK. The installation process begins.

(28)

15. If the installation is successful, the Installation completed successfully screen

appears.

FIGURE2-12 Installation completed successfully screen

16. Click Close.

Post Installation Tasks

Immediately after installing Trend Micro™ Security for Macintosh, perform the following tasks to ensure that:

• the product is working

• the product has the newest components

(29)

Perform the following tasks:

1. Access the Trend Micro™ Security for Macintosh product console.

2. Enable AutoUpdate, Real-time Scan, and Web Threat Protection. 3. Check for Internet connectivity by opening a Web browser and try to access:

Http://www.trendmicro.com

4. Update the product using Update Now.

(30)
(31)

Deploying Settings

This chapter describes how to deploy Trend Micro™ Security for Macintosh basic configuration settings to endpoint computers.

(32)

Deploying Settings

Individual settings can be modified from the administrator’s computer and deployed to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these procedures.

To deploy the settings:

• Step 1: Configure Settings on page 3-3

• Step 2: Stop the Trend Micro™ Security for Macintosh Process on page 3-10 • Step 3: Copy Settings on page 3-14

(33)

Step 1: Configure Settings

Configure the baseline settings from the administrator’s computer before deploying to endpoint computers. Refer to the Trend Micro™ Security for Macintosh User’s Guide for more information on these settings.

Configure the following settings from the administrator’s computer for deployment:

Note: Only these settings can be deployed to endpoint computers. • Web Protection

(34)

• Approved Websites

(35)

• Scan Settings

• Real-time Scan settings

(36)

• Manual Scan settings

(37)

• Scheduled Scan settings

(38)

• Exception List

(39)

• Update settings

• AutoUpdate settings

(40)

• Proxy Settings

FIGURE3-8 Proxy Settings screen

Step 2: Stop the Trend Micro™ Security for Macintosh

Process

Stop the Trend Micro™ Security for Macintosh processes from the endpoint computers by using Apple Remote Desktop™.

To stop the Trend Micro™ Security for Macintosh process:

(41)

2. Select the endpoint computers to deploy to in Apple Remote Desktop.

FIGURE3-9 Apple Remote Desktop screen

(42)

4. Type the following UNIX command:

sudo SystemStarter stop TmccCore

FIGURE3-10 The Send UNIX Command screen

5. Select User and type root under Run Command as.

6. (Optional) Click Save to save this command for deployment to new computers

(43)

7. Click Send. The Send UNIX Command processing request screen appears.

(44)

8. Verify that the setting deployment successful. The Send UNIX Command: Succeeded on all appears or Successful appears under Task Status for the selected

endpoints.

FIGURE3-12 Successfully stopped process screen

Step 3: Copy Settings

Copy the settings from the administrator’s computer to the endpoint computers using Apple Remote Desktop.

To copy the settings:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.

(45)

3. Click Copy. The Copy Items screen appears.

FIGURE3-13 The Copy Items screen

(46)

8. (Optional) Click Save to save this command for deployment to new machines

installed in the network.

9. Click Copy. Apple Remote Desktop copies the settings to the endpoint computer. 10. Verify that the setting deployment was successful. The Copy Items: Succeeded on

all appears or Successful appears under Task Status for the selected endpoints.

FIGURE3-14 Successfully copied items screen

Step 4: Restart Endpoint Computers

Restart endpoint computers to ensure that the settings have been deployed. To restart endpoint computers:

(47)

2. Select Manage from the Apple Remote Desktop application menu.

(48)

3. Select Restart. The Restart Computers screen appears.

FIGURE3-16 Restart Computers screen

4. Select the endpoint computers to restart.

(49)

6. Verify that the computers were successfully restarted. The Restart Computers: Succeeded on all appears or Successful appears under Task Status for the selected

endpoints.

(50)
(51)

Uninstalling Trend Micro™ Security

for Macintosh

This chapter describes the Trend Micro™ Security for Macintosh uninstallation. This chapter discusses the following topics:

(52)

Uninstalling Trend Micro™ Security for Macintosh

The process of uninstalling Trend Micro™ Security for Macintosh is similar to the uninstallation process for other Macintosh™ software.

There are two ways to uninstall Trend Micro™ Security for Macintosh: • Using Apple Remote Desktop™

• Uninstalling manually from the local machine

Using Apple Remote Desktop

Use this process to uninstall remotely from one or several computers. To uninstall using Apple Remote Desktop:

1. Open Apple Remote Desktop. The Remote Desktop screen appears.

(53)

3. Click UNIX. The Send UNIX Command screen opens.

(54)

4. Type the following UNIX command:

/Library/Application\ Support/TrendMicro/uninstall/uninstall.sh

FIGURE4-2 Send UNIX Command screen

5. Select User and type root under Run Command as.

6. (Optional) Click Save to save this command for deployment to computers in the

(55)

7. Click Send. The Send UNIX Command processing request screen appears.

(56)

8. Verify that the uninstallation was successful. The Send UNIX Command: Succeeded on all appears or 100% appears under Task Status for the selected

endpoints.

(57)

Local Uninstallation

Use this process to uninstall from a single computer in the network. To manually uninstall Trend Micro™ Security for Macintosh:

1. Locate and double-click the Trend Micro Security Standalone 1.0.xxx.dmg file. The files included in the disk image appears.

(58)

2. Double-click the Uninstall Trend Micro Security Standalone icon to launch the uninstaller program. The confirmation message appears.

FIGURE4-6 Confirm uninstallation popup

3. Click Uninstall. The password confirmation popup appears.

FIGURE4-7 Password confirmation popup

4. Type the Name and Password.

(59)

5. Click OK. The uninstallation process begins.

FIGURE4-8 Uninstalling Trend Micro Security screen

6. If uninstallation is successful, an Uninstallation Completed screen will appear.

FIGURE4-9 Uninstallation completed screen

(60)
(61)

Frequently Asked Questions

This chapter presents and answers frequently asked questions about Trend Micro™ Security for Macintosh.

(62)

Frequently Asked Questions

Installation

Why do I receive a warning when I install Trend Micro™ Security for Macintosh on OS™ X version 10.4.11 or 10.5.5 or lower?

Trend Micro™ Security for Macintosh supports two separate versions of Mac OS X (Tiger and Leopard).

• If you are using the Tiger version of the Mac OS X (10.4), you cannot install Trend Micro™ Security for Macintosh on a version of Tiger lower than 10.4.11.

• If you are using the Leopard version of the Mac OS X (10.5), you can install Trend Micro™ Security for Macintosh on versions of Leopard that are less than 10.5.5. However, Trend Micro™ Security for Macintosh will issue a warning.

Tip: Trend Micro recommends using the latest version of the Mac operating system.

Uninstallation

Why does no popup window appear when I try to uninstall Trend Micro™ Security for Macintosh?

When you attempt to uninstall Trend Micro™ Security for Macintosh, a popup window will usually appear asking for your administrator credentials. If you typed your

administrator credentials anytime within the previous 5 minutes, Trend Micro™ Security

for Macintosh will remember them and the uninstallation program will not require you to

provide the credentials again.

What do I do if I receive an uninstall failed message? 1. Restart your computer.

2. Reinstall Trend Micro™ Security for Macintosh.

(63)

Compatibility

What do I do if my computer performance decreases after installing Trend Micro™ Security for Macintosh?

(64)
(65)

Getting Support

Trend Micro is committed to providing service and support that exceeds our users’ expectations. This chapter contains information on how to get technical support. Remember, you must register your product to be eligible for support.

(66)

Contacting Technical Support

Before contacting technical support, here are two things you can quickly do to try and find a solution to your questions:

Check your documentation: the FAQ section of this User’s Guide and Online Help provide comprehensive information about Trend Micro™ Security for Macintosh. Search both documents to see if they contain your solution.

Visit our Technical Support Web site: our Technical Support Web site contains the latest information about all Trend Micro products

The support Web site has answers to previous user inquiries. To search the Knowledge Base, visit

http://esupport.trendmicro.com/support

In addition to phone support, Trend Micro provides the following resources: • Email support

support@trendmicro.com

• Readme: late-breaking product news, installation instructions, known issues, and version specific information

• Product updates and patches

http://www.trendmicro.com/download/

To locate the Trend Micro office nearest you, open a Web browser to the following URL:

http://www.trendmicro.com/en/about/contact/overview.htm

To speed up the issue resolution, when you contact our staff please provide as much of the following information as you can:

• Version

(67)

Sending Infected File Samples

You can send viruses, infected files, Trojan programs, spyware, and other grayware to Trend Micro. More specifically, if you have a file that you think is some kind of threat but the scan engine is not detecting it or cleaning it, you can submit the suspicious file to Trend Micro using the following Web address:

http://subwiz.trendmicro.com/SubWiz/Default.asp

Please include in the message text a brief description of the symptoms you are experiencing. Our team of virus engineers will "dissect" the file to identify and characterize any viruses it may contain.

Introducing TrendLabs

Trend Micro TrendLabsSM is a global network of antivirus research and product support centers that provide continuous 24 x 7 coverage to Trend Micro customers around the world.

Staffed by a team of more than 250 engineers and skilled support personnel, the TrendLabs dedicated service centers in Paris, Munich, Manila, Taipei, Tokyo, and Irvine, CA. provide a rapid response to any virus outbreak or urgent customer support issue, anywhere in the world.

For more information about TrendLabs, please visit:

(68)

Other Useful Resources

Trend Micro offers a host of services through its Web site, www.trendmicro.com.

Internet-based tools and services include:

• Virus Map: monitors virus incidents around the world

(69)

A

Apple Remote Desktop 2-3, 3-10, 4-2 Audience vi B Baseline settings 3-3 C Copy Items 3-15 Copy Settings 3-14 D Deployment 2-3 DMG Image 2-6 Document

document conventions vii Document Conventions vii Document Feedback 1-ii Documentation audience vi F FAQs 5-2 Compatibility 5-3 Installation 5-2 Uninstallation 5-2 Features and Benefits 1-3 Feedback 1-ii H Help Icon vi I Installation dmg image 2-6 local 2-6 manual 2-6 post installation 2-14 protection status 1-2 L License Agreement 2-10 Logs 1-4 M Malware Protection 1-3 N Notifications 1-4 P

Post Installation Tasks 2-14 Pre-installation Considerations 2-2

R

Remote Desktop 2-3, 3-10, 4-2 Restart 3-16

S

(70)

References

Related documents

Optionally, Trend Micro Smart Protection Server and Deep Security Relay can be installed on virtual machines on Host A?. An additional virtual machine can also be provided for

TrendLabs is Trend Micro’s global infrastructure of antivirus research and product support centers that provide up-to-the minute security information to Trend Micro customers.

• If you plan to upgrade the OfficeScan 10.x server directly on the server computer, you do not need to make scan method changes from the web console because clients will retain

Using File Reputation Services ...2-2 Scan Methods ...2-2 Scan Method Deployment Overview ...2-8 Scan Method Deployment During Fresh Installation ...2-9 Scan Method Deployment

The second component of the Anti Diet Solution program is the 28 Day Fast Start Diet book, which outlines a 28 day meal plan that’s loaded with the foods that the author says

Get together with a group of friends (for example, horn, trombone, electronic keyboard and drums), play through the piece twice, then take turns to improvise over the

Rute yang akan dilewati proyek pembangunan interkoneksi Sumatera – Jawa adalah di wilayah Sumatera : Interkoneksi Sumatera-Jawa diperkirakan akan menghubungkan

Associates in Medical Physics provides quarterly site visits with clients to audit the radiation safety program.. This is followed by a summary report compiling the findings