Trend micro INTERNET SECURITY 2008 User Manual

Getting Started Guide
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the Readme file, release notes, and the latest version of the Getting Started Guide, available from Trend Micro’s website:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro logo, Trend Micro Internet Security, Trend Micro Internet Security Pro, HouseCall, TrendSecure, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. All other brand and product names are trademarks or registered trademarks of their respective companies or organizations.
Copyright© 2007 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated.
Document part number: PCEM63335/70828
Release date: September 2007
The Getting Started Guide for Trend Micro™ Internet Security 2008 explains how to set up and start using the software. Please read it before installing the software.
For technical support, please refer to Technical Support in this guide for contact information. For detailed instructions, refer to the Product Help, accessible from the main console of Trend Micro Internet Security 2008.

Contents

Preface
Documentation ........................................................................ii
About this Getting Started Guide ............................................ii
Document Conventions ...........................................................ii
Chapter 1: Introduction
What’s New .............................................................................2
Protection Checklist ................................................................ 3
Automatic Protection ...............................................................3
Main Console ..........................................................................4
Action Buttons and System Tray Icons ...............................4
Chapter 2: Installation
Computer Requirements ..........................................................6
Before Installation ...................................................................7
Upgrading from a Previous Release ........................................8
Installing Trend Micro Internet Security 2008.........................9
Uninstalling Trend Micro Internet Security 2008 ..................15
Chapter 3: Getting Started
Verifying a Successful Installation .......................................20
Accessing the Main Console .................................................20
Checking Current Settings ....................................................20
Getting Updates .....................................................................21
Setting a Password ................................................................22
Getting More Help ................................................................22
Chapter 4: Troubleshooting
Installation and Activation Problems .....................................24
Update Problems ...................................................................25
Frequently Asked Questions .................................................26
i
Chapter 5: Technical Support
Before Contacting Technical Support ...................................30
Contacting Technical Support ...............................................30
Submitting Samples of Infected Files ...................................30
Reporting Spam, Fraud, and Incorrectly Tagged Messages .. 31
TrendLabs ..............................................................................31
Other Resources ....................................................................31
ii Contents
Preface
This guide explains how to install and begin using Trend Micro™ Internet Security 2008.
This preface covers the following topics:
Documentation on page ii
About this Getting Started Guide on page ii
Document Conventions on page ii
i

Documentation

In addition to this guide, Trend Micro™ Internet Security 2008 also includes Product Help, which explains key software features. Click the Help button to get help with the window currently open, or find information on other topics.
Tip: Click Update Now on the main console to get the latest update for Trend
Micro Internet Security 2008
http://www.trendmicro.com/download .
. You can also download the updates from

About this Getting Started Guide

•The Introduction summarizes the main features of Trend Micro Internet Security 2008.
Installation explains how to install, upgrade, renew, or remove Trend Micro Internet Security 2008.
Getting Started tells how to start using the software.
Troubleshooting suggests how to solve basic problems, and includes a list of Frequently Asked Questions.
Technical Support gives ways to contact Trend Micro if you cannot find the answers you need in the Troubleshooting section.

Document Conventions

This guide adheres to the following conventions:
STYLE EXPLANATION
ALL CAPITALS Acronyms, abbreviations, and keys on your keyboard
Bold Menu, menu command, button, tab, and option names, as
Italics Documentation titles
Monospace Examples (including sample command lines), program
Note:
Tip:
WA RN I N G !
TABLE 1. Documentation conventions
ii Documentation
well as service and process names
code, Internet and World Wide Web addresses, file names, folder names, and program output
Configuration notes
Recommendations
Things you should not do

Introduction

This chapter gives an overview of Trend Micro Internet Security 2008, and covers the following topics:
What’s New on page 2
Protection Checklist on page 3
Automatic Protection on page 3
Main Console on page 4
To start the installation procedure, refer to one of the following topics:
Computer Requirements for memory, hard drive, and other specifications
Before Installation for pre-installation tasks and other considerations
Upgrading from a Previous Release if your computer has an older version of Trend Micro Internet Security installed
Installing Trend Micro Internet Security 2008 for installation instructions
Getting Started for instructions on using Trend Micro Internet Security 2008
1
1

What’s New

1
A sophisticated monitoring system intercepts and blocks unauthorized changes to your computer’s operating system and applications.
n o
i t
c u d o
r t
n I
A single integrated scan now checks for computer viruses, spyware, and operating system security flaws.
Security activity reports let you see at a glance how Trend Micro Internet Security 2008 has protected you recently.
New Trend Micro Data Network controls offer more protection.
A streamlined installation process sets up the software quickly and easily.
Image spam filtering catches unwanted messages containing only advertising graphics used to bypass text-based scanning systems.
2 What’s New

Protection Checklist

Trend Micro Internet Security 2008 protects you from these threats:
THREAT PROTECTION
Viruses, Trojan horse programs, and worms on your computer or arriving in email messages
Spyware, Web browser tracking “cookies,” rootkits
Unauthorized changes to your operating system settings, registry or Hosts file
Unsolicited “spam” messages and email fraud attempts (“Phishing”)
“Pharming” and other Web threats Protection Against Web Threats
Hackers Personal Firewall
Wireless network intruders Wireless Home Network Monitor
Theft of private information from instant messages, email messages or websites
Microsoft
TABLE 1-1. Trend Micro Internet Security 2008 protection features
®
software security flaws Scheduled & Custom Scans
Protection Against Viruses & Spyware
Protection Against Viruses & Spyware
Unauthorized Change Prevention
Spam Email Filter
Data Theft Prevention

Automatic Protection

Once installed, Trend Micro Internet Security 2008 protects you by automatically performing the following tasks:
Checks for and downloads any new update every three hours
Helps prevent spyware from monitoring your computer, as well as unauthorized changes to your computer’s settings
Searches for risks every time you open, copy, move, or save a file
Stops you from downloading risky files, and blocks attempts to visit sites that pose a security threat
Helps protect your computer from hackers and network viruses
1
I n
t r o
d u c t
i o
n
For greater protection, enable the optional Parental Controls, Spam Email Filter, Data Theft Prevention, and Wireless Home Network Monitor features.
3Protection Checklist

Main Console

Use the main console to see an overview of how Trend Micro Internet
1
Security 2008 protects you. Clicking the tabs on the left side of the window reveals more detailed information and controls related to those features.
n o
i t
c u d o
r t
n I
Tip: On the main console’s Overview tab, click the link next to Protection
status to see all of the features currently protecting you.

Action Buttons and System Tray Icons

The list below explains buttons and icons commonly used in Trend Micro Internet Security 2008:
BUTTON /
I
CON
Scans your computer for security threats.
Downloads the latest update from Trend Micro.
Closes a window and saves any changes you made.
Closes the window without saving any changes.
Trend Micro Internet Security 2008 has started loading.
Trend Micro Internet Security 2008 currently protects you.
Trend Micro Internet Security 2008 needs your help to solve a problem (double-click the icon to open the main console for more information).
Trend Micro Internet Security 2008 has expired.
DESCRIPTION
TABLE 1-2. Common program buttons and icons
4 Main Console
Loading...
+ 28 hidden pages