Trend Micro Incorporated reserves the right to make changes to this document and to the
products described herein without notice. Before installing and using the software,
please review the Readme file, release notes, and the latest version of the Getting Started Guide, available from Trend Micro’s website:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro logo, Trend Micro Internet Security, Trend Micro
Internet Security Pro, HouseCall, TrendSecure, and TrendLabs are trademarks or
registered trademarks of Trend Micro Incorporated. All other product or company
names may be trademarks or registered trademarks of their owners. All other brand and
product names are trademarks or registered trademarks of their respective companies or
organizations.
The Getting Started Guide for Trend Micro™ Internet Security 2008 explains how
to set up and start using the software. Please read it before installing the software.
For technical support, please refer to Technical Support in this guide for contact
information. For detailed instructions, refer to the Product Help, accessible from the
main console of Trend Micro Internet Security 2008.
Other Resources ....................................................................31
iiContents
Preface
This guide explains how to install and begin using Trend Micro™ Internet
Security 2008.
This preface covers the following topics:
•Documentation on page ii
•About this Getting Started Guide on page ii
•Document Conventions on page ii
i
Documentation
In addition to this guide, Trend Micro™ Internet Security 2008 also includes
Product Help, which explains key software features. Click the Help button to
get help with the window currently open, or find information on other topics.
Tip:Click Update Now on the main console to get the latest update for Trend
Micro Internet Security 2008
http://www.trendmicro.com/download .
. You can also download the updates from
About this Getting Started Guide
•The Introduction summarizes the main features of Trend Micro Internet
Security 2008.
•Installation explains how to install, upgrade, renew, or remove Trend
Micro Internet Security 2008.
•Getting Started tells how to start using the software.
•Troubleshooting suggests how to solve basic problems, and includes a list
of Frequently Asked Questions.
•Technical Support gives ways to contact Trend Micro if you cannot find
the answers you need in the Troubleshooting section.
Document Conventions
This guide adheres to the following conventions:
STYLEEXPLANATION
ALL CAPITALSAcronyms, abbreviations, and keys on your keyboard
BoldMenu, menu command, button, tab, and option names, as
ItalicsDocumentation titles
MonospaceExamples (including sample command lines), program
Note:
Tip:
WA RN I N G !
TABLE 1.Documentation conventions
iiDocumentation
well as service and process names
code, Internet and World Wide Web addresses, file names,
folder names, and program output
Configuration notes
Recommendations
Things you should not do
Introduction
This chapter gives an overview of Trend Micro Internet Security 2008, and
covers the following topics:
•What’s New on page 2
•Protection Checklist on page 3
•Automatic Protection on page 3
•Main Console on page 4
To start the installation procedure, refer to one of the following topics:
•Computer Requirements for memory, hard drive, and other specifications
•Before Installation for pre-installation tasks and other considerations
•Upgrading from a Previous Release if your computer has an older version
of Trend Micro Internet Security installed
•Installing Trend Micro Internet Security 2008 for installation instructions
•Getting Started for instructions on using Trend Micro Internet Security
2008
1
1
What’s New
1
•A sophisticated monitoring system intercepts and blocks unauthorized
changes to your computer’s operating system and applications.
n
o
i
t
c
u
d
o
r
t
n
I
•A single integrated scan now checks for computer viruses, spyware, and
operating system security flaws.
•Security activity reports let you see at a glance how Trend Micro Internet
Security 2008 has protected you recently.
•New Trend Micro Data Network controls offer more protection.
•A streamlined installation process sets up the software quickly and easily.
•Image spam filtering catches unwanted messages containing only
advertising graphics used to bypass text-based scanning systems.
2What’s New
Protection Checklist
Trend Micro Internet Security 2008 protects you from these threats:
THREATPROTECTION
Viruses, Trojan horse programs, and worms on
your computer or arriving in email messages
Spyware, Web browser tracking “cookies,”
rootkits
Unauthorized changes to your operating
system settings, registry or Hosts file
Unsolicited “spam” messages and email fraud
attempts (“Phishing”)
“Pharming” and other Web threatsProtection Against Web Threats
HackersPersonal Firewall
Wireless network intrudersWireless Home Network Monitor
Theft of private information from instant
messages, email messages or websites
Microsoft
TABLE 1-1.Trend Micro Internet Security 2008 protection features
®
software security flawsScheduled & Custom Scans
Protection Against Viruses & Spyware
Protection Against Viruses & Spyware
Unauthorized Change Prevention
Spam Email Filter
Data Theft Prevention
Automatic Protection
Once installed, Trend Micro Internet Security 2008 protects you by
automatically performing the following tasks:
•Checks for and downloads any new update every three hours
•Helps prevent spyware from monitoring your computer, as well as
unauthorized changes to your computer’s settings
•Searches for risks every time you open, copy, move, or save a file
•Stops you from downloading risky files, and blocks attempts to visit sites
that pose a security threat
•Helps protect your computer from hackers and network viruses
1
I
n
t
r
o
d
u
c
t
i
o
n
For greater protection, enable the optional Parental Controls, Spam Email
Filter, Data Theft Prevention, and Wireless Home Network Monitor features.
3Protection Checklist
Main Console
Use the main console to see an overview of how Trend Micro Internet
1
Security 2008 protects you. Clicking the tabs on the left side of the window
reveals more detailed information and controls related to those features.
n
o
i
t
c
u
d
o
r
t
n
I
Tip:On the main console’s Overview tab, click the link next to Protection
status to see all of the features currently protecting you.
Action Buttons and System Tray Icons
The list below explains buttons and icons commonly used in Trend Micro
Internet Security 2008:
BUTTON /
I
CON
Scans your computer for security threats.
Downloads the latest update from Trend Micro.
Closes a window and saves any changes you made.
Closes the window without saving any changes.
Trend Micro Internet Security 2008 has started loading.
Trend Micro Internet Security 2008 currently protects you.
Trend Micro Internet Security 2008 needs your help to solve a
problem (double-click the icon to open the main console for more
information).
Trend Micro Internet Security 2008 has expired.
DESCRIPTION
TABLE 1-2.Common program buttons and icons
4Main Console
Loading...
+ 28 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.