2
M a n a g e d Trend Micro Portable Security 2 delivers high-performance, cost-effective security services, helping protect companies by finding and removing security threats from computers or devices that do not have security software or an Internet connection. Use the Trend Micro Portable Security 2 Management Program and Scanning Tool together or use the Scanning Tool as a standalone device. To manage the Scanning Tool settings or logs, refer to the Managed section. To use the device as a simple Scanning Tool, refer to the Standalone section. System Requirements Please visit the Trend Micro website (http://go2.trendmicro.com/geoip/tmps2) for details. TREND MICRO Portable Security 2 TM 1 Installing the Management Program 1. Insert the Scanning Tool device into the computer where you plan to install the Management Program. 2. Double-click the TMPS2_SYS (F):\MP\Setup.exe file. Note: The drive letter can be different. For more details, refer to the Trend Micro Portable Security 2 User’s Guide. Activating the Scanning Tool 1. Plug-in the new Scanning Tool to the Management Program computer. The Management Program will automatically activate. 2. Open the Management Program and verify that the new device is on the Registered Scanning Tools list. Getting Updates 1. Click Update Now on the Management Program’s Overview tab to download the most recent security updates from Trend Micro. 2. Plug-in the Scanning Tool into this Management Program computer, go to the Plugged-in Scanning Tool tab, then click Sync Components and Settings. Viewing Log Data 1. Plug-in the Scanning Tool into this Management Program computer. 2. To transfer log data from the Scanning Tool to the Management Program, select the Plugged-in Scanning Tools tab in the Management Program and then click Transfer Logs. 3. To view log data, select the Logs and Reports tab in the Management Program, select an item from the list of computers, and then select an item from the Time column. M a n a g e d Using the Scanning Tool 1. To launch the Scanning Tool, insert the Scanning Tool device into the computer that you want to check. 2. In the window that opens automatically, choose Launch Trend Micro Portable Security 2 or open Windows Explorer and double-click Launcher.exe from the TMPS2_SYS partition. 3. Click Scan Now in the next window that opens or wait 30 seconds for the automatic scan to start. 4. If the scan detects any security threats, you can choose to fix the threat or do nothing. The actions available for each threat depend on the scan settings. l Fix: The Scanning Tool will try to clean or quarantine the file and save it in the Scanning Tool. l Ignore: The Scanning Tool will not take any action against the threat.

Portable Security 2TM - Trend Micro€¦ · Portable Security 2 TM 1 Installing the Management Program 1. Insert the Scanning Tool device into the computer where you plan to install

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Portable Security 2TM - Trend Micro€¦ · Portable Security 2 TM 1 Installing the Management Program 1. Insert the Scanning Tool device into the computer where you plan to install

Managed

Trend Micro Portable Security 2™ delivers high-performance, cost-effective security services, helping protect companies by finding and removing security threats from computers or devices that do not have security software or an Internet connection.Use the Trend Micro Portable Security 2 Management Program and Scanning Tooltogether or use the Scanning Tool as a standalone device. To manage the Scanning Tool settings or logs, refer to the Managed section. To use the device as a simple Scanning Tool, refer to the Standalone section.

System RequirementsPlease visit the Trend Micro website (http://go2.trendmicro.com/geoip/tmps2) for details.

TREND MICRO

Portable Security 2TM

1

Installing the Management Program1. Insert the Scanning Tool device into the computer where you plan to

install the Management Program.

2. Double-click the TMPS2_SYS (F):\MP\Setup.exe file.

Note: The drive letter can be different.

For more details, refer to the Trend Micro Portable Security 2 User’s Guide.

Activating the Scanning Tool1. Plug-in the new Scanning Tool to the Management Program computer.

The Management Program will automatically activate.

2. Open the Management Program and verify that the new device is on the Registered Scanning Tools list.

Getting Updates1. Click Update Now on the Management Program’s Overview tab to

download the most recent security updates from Trend Micro.

2. Plug-in the Scanning Tool into this Management Program computer, go to the Plugged-in Scanning Tool tab, then click Sync Components and Settings.

Viewing Log Data1. Plug-in the Scanning Tool into this Management Program computer.

2. To transfer log data from the Scanning Tool to the Management Program, select the Plugged-in Scanning Tools tab in the Management Program and then click Transfer Logs.

3. To view log data, select the Logs and Reports tab in the Management Program, select an item from the list of computers, and then select an item from the Time column.

Managed

Using the Scanning Tool1. To launch the Scanning Tool, insert the Scanning Tool device into the

computer that you want to check.

2. In the window that opens automatically, choose Launch Trend Micro Portable Security 2 or open Windows Explorer and double-click Launcher.exe from the TMPS2_SYS partition.

3. Click Scan Now in the next window that opens or wait 30 seconds for the automatic scan to start.

4. If the scan detects any security threats, you can choose to fix the threat or do nothing. The actions available for each threat depend on the scan settings.

l Fix: The Scanning Tool will try to clean or quarantine the file and save it in the Scanning Tool.

l Ignore: The Scanning Tool will not take any action against the threat.

Page 2: Portable Security 2TM - Trend Micro€¦ · Portable Security 2 TM 1 Installing the Management Program 1. Insert the Scanning Tool device into the computer where you plan to install

Standalone

1. Activate the Scanning Tool.a. Plug-in the new Scanning Tool. b. Double-click the TMPS2_SYS (F):\Launcher.exe file.c. Select Standalone Scanning Tool and click Next.d. Read and agree to the License Agreement, then provide the activation code.e. Click Activate and finish activation.

2. Click Update Now from the Status & Update tab to get the latest components.3. Make changes to the scan settings.

a. Insert the Scanning Tool device into the computer that you want to check. The Scanning Tool will automatically start scanning.

b. If the scan detects any security threats, you can choose to fix the threat or do nothing.

c. You can continue to do this on other computers you want to check.

Removing the Scanning ToolClick the Trend Micro Portable Security 2 system tray icon on the bottom right corner of the Windows desktop to remove the USB device.

Renewing Your SubscriptionTrend Micro generally offers technical support for a period of one year once you have completely finished activating the software (check your license for full details). Please make sure to renew your subscription before it expires. If you do not renew your subscription, you will no longer receive security updates.

Note: Depending on the number of days remaining before your software expires, different messages will appear at the bottom of the Trend Micro Portable Security 2 window.

Safety Precautionsl Please do not try to modify, disassemble, or repair the USB device.l Always attach the USB device to the correct connector.l Make sure to remove any dust or condensation before using the USB device, and

keep the connector clean.l Use only a soft cloth to clean the USB device, and never treat it with liquid

cleaning products.l Never touch the USB device with wet hands, do not place anything on top of it,

and try to avoid dropping it.l Avoid storing the USB device in direct sunlight, or in areas where it could be

exposed to static electricity, humidity, dust, or corrosive materials.l Please do not turn off or reset the computer while it interacts with the USB device.l Please import log data from the USB device into the Management Program regularly.l Because the USB device does not allow direct access to the files stored on it,

please use the Management Program to delete all of the log data before discarding an old USB device.

l The loss or theft of a USB device could allow others to see confidential information stored in the log files, so please maintain careful control over them.

l In the event of any hardware problems, please stop using the USB device immediately and contact Trend Micro for help.

©2015 by Trend Micro Incorporated. All Right Reserved. Trend Micro, Trend Micro Portable Security 2, and the t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated.All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.

Item Code: TPEQ27065/150717

2

Message

You have activated this device and no action is needed.

Your activation code will expire soon, so you should get a new one.

Your activation code has expired, so you should provide a new one.

Icons

TREND MICRO

Portable Security 2TM

Trade Name:Equipment Name:

Model Number:Certification Number:Date of Manufacture:

Manufacturer / Country of Origin:

Trend Micro Inc.Trend Micro Portable SecurityTrend Micro Portable Security 2MSIP-REI-1tm-TMPS2May 2014Trend Micro / Japan