How to set up smartphones and PCs. Informational portal

Trend micro how to contact Russian support. Installing Trend Micro OfficeScan Client

Trend Micro Corporation, the world's leading manufacturer of network antivirus and Internet data security software and services, was founded in 1988 by Steve Chang, who is now the company's general manager. Today, Trend Micro, headquartered in Tokyo, is a multinational corporation with about 1,800 employees and offices in thirty countries around the world.

Trend Micro is a world leader in network antivirus, Internet content protection and related services. Trend Micro products can effectively protect networks of any size.

Distinctive features of Trend Micro products are:

  • A wide range of products for anti-virus protection, epidemic prevention and damage recovery;
  • quality system centralized management that allows the administrator antivirus security manage anti-virus products in networks containing 1000 or more protected objects;
  • The cost of renewing the use of licenses for any Trend Micro software package is 30% of the original cost of the product (70% discount!).

Detailed information about Trend Micro products is available on the website of the official representative office of Trend Micro in Russia www.trendmicro-russia.ru.

Trend Micro Worry-Free Security

Trend Micro Control Manager

Trend Micro Control Manager provides more possibilities client-level control and availability, and greater threat awareness to optimize protection throughout the organization. The Centralized Threat Management Console streamlines the management of Trend Micro solutions and provides increased security, thanks to customizable reports and role-based administration, as well as features automatic update, alerts, threat responses, and license updates. Unlike other solutions, Control Manager does not require installation of additional software by the client and has improved scalability with multi-level cascading control.

Trend Micro NeatSuite Standard

NeatSuite Standard is a fully integrated, centrally managed corporate network protection system designed to protect the Internet gateway, email and file servers, as well as desktop computers from web threats and other malware. NeatSuite Standard is scalable to meet the needs of midsize businesses with limited IT resources. This is an integrated integrated system security, which is characterized by ease of management and deployment.

Unlike other enterprise products, the NeatSuite Standard combines centralized management from a single console, support for Windows® and Linux® operating systems, a universal installation system with GUI and unparalleled web threat protection.

Trend Micro NeatSuite Advanced is a multi-layered multi-threat protection system designed to large enterprises. Fully integrated, centrally managed enterprise network protection system designed to protect the Internet gateway, mail servers, network servers, storage, and desktop computers from web threats and other malware. NeatSuite Advanced is scalable to meet the needs of large enterprises. It is a comprehensive gateway-to-endpoint protection system that includes flexible configuration and administration for maximum efficiency.

Protect yourself from viruses

If you are an experienced system administrator or work as part of a team of professionals, then you can certainly implement antivirus solutions on one's own. But, perhaps you have questions about the choice of antivirus software or its installation and maintenance. In this case, you can ask for help to our technicians.

Today, the source of one of the main security problems of computer systems is malware. software. Hundreds of thousands of computers infected with viruses are united in botnets, with the help of which attacks are subsequently carried out on servers on the Web, spam and new modifications of viruses are sent. Corporate LANs are of particular interest to attackers because they are connected to global network through fast channels communications and in one local network can simultaneously work up to several hundred or even thousands of computers.

The process of capturing a local network is quite simple: an attacker infects one computer, installs special tools on it, and then takes control of all other computers. If the network is managed by a negligent system administrator, then each computer has its own, personal version of the antivirus, the virus definition databases of which may not be updated for one reason or another for a very long time, or the antivirus may not be installed at all, or the user has the right to disable antivirus monitoring. In addition, your computer may not have critical updates for operating system, the rights of the user account are not limited, the rights to access to the file system and so on. The sum of these factors leads to a very fast and fairly simple infection of the entire local network. Given that such an administrator, most likely, does not have control over external traffic configured, he can only find out about the hacking of the local network at the end of the month, having received a bill for a huge amount from the provider. And only after that, the treatment of computers, the updating of anti-virus databases, and the installation of updates begin. Thus, without the use of specialized software and qualified service personnel, large local networks can serve as a breeding ground for viruses and spam with very high activity for quite a long time.

In this article, we will consider one of the products for implementing centralized virus protection on workstations of local network users. The use of such a product allows real-time monitoring of manifestations in a single management console viral activity in the network, the relevance of databases and software modules anti-virus, centrally, from the server, manage the anti-virus protection settings of all computers of an enterprise of any size, view reports, and much more.

Despite the fact that the product version is in Russian, the web console is not translated into Russian.

On the right side home page management console in graphical form all statistics of OfficeScan operation are shown: the names of active modules, the number and names of the latest detected threats, the number of client computers, the relevance of their virus definition databases and OfficeScan modules.

Networked Computers - Client Management

From the menu in the computer list, you can perform all the actions on the OfficeScan client:

  • Status- view a detailed report on one or more client computers (version of the operating system, OfficeScan modules, virus definition databases, latest detected threats, client settings, and so on).
  • Tasks- forced start of a virus scan; removal of the client part; restore from backup copies of files previously marked as spyware or grayware.
  • Settings- settings for manual, automatic, scheduled virus scans; settings forced verification for viruses; update agent settings; setting user access rights to the settings of the client part; lists of spyware or grayware; backup and recovery from backup settings.
  • Logs- view reports on detected viruses, spyware or grayware, firewall logs and web reputation logs.
  • Manage Client Tree- adding, renaming or deleting domains, moving clients between domains, removing clients from the list.
  • Export- uploading all information to a file with the csv extension for further analysis.

When selecting different information views from the Client tree view field, the list can be filtered to display the status of certain modules only (firewall, antivirus, antispyware) or to display the status of all OfficeScan client modules at the same time.

Networked Computers - Global Client Settings

The settings listed on this screen apply to all OfficeScan clients. Here you can specify anti-virus scanning settings (scanning archives, cleaning them, limiting the nesting level of scanned archives, excluding directories with OfficeScan databases from monitoring, and Microsoft Exchange Server), spyware and grayware search settings, how often clients send firewall logs to the OfficeScan server, pop-up message settings on users' computers (required reboot after installing or updating the client to run the OfficeScan kernel-mode driver, and critically outdated databases). virus definitions). Here it is configured automatic check the health of the client part and its restart if necessary, disk space is reserved for receiving and unpacking updates, and so on. In the same window, you can select how OfficeScan clients are grouped: by NetBIOS domain, by domain Active Directory or by DNS domain.

Networked Computers - Web Reputation

Depending on the gateway used by the client computer at different times, OfficeScan determines its location. When a computer is outside a trusted network, a strict policy of restricting visited websites can be applied to it.

By default, sites from which Trend Micro OfficeScan and Microsoft Windows updates can be downloaded are added to the list of allowed hosts. The administrator has the ability to add any sites to this list, moreover, to add the entire domain at once or only a specific page. Each site visited by the user is evaluated on a five-point scale: from low level threats to high. Most high level protection blocks unrated sites, sites containing web threats and sites that may contain such threats with varying degrees of probability. At the bottom of this tab, there is a checkbox "Allow clients to send logs to the OfficeScan server". After checking it, clients will periodically send logs of the reputation filter of visited sites to the OfficeScan server, after analyzing which the administrator can adjust the protection level or add to the list of allowed sites.

The filter can be applied both to computers located in the local network and to external computers. The settings of these two zones are independent and divided into the tabs "External Computers" and "Internal Computers". Is it currently client computer inside or outside the local network, OfficeScan determines the IP and MAC addresses of the gateway being used, which must be pre-specified on the Computer Location tab.

Networked Computers - Firewall

On this tab, traffic restriction policies are configured. By default, there are several policies that are required to operate and manage Trend Micro OfficeScan. An administrator can create any number of new policies. Their settings are flexible enough to create policies of almost any complexity.

The template on which it is proposed to configure a new policy blocks all traffic, except for the one described by the allowing rules at the bottom of the window. An administrator can completely change the policy to solve a particular problem, for example, to allow all traffic, except for certain ones. In any case, before turning on the firewall, it is imperative to inspect the created policies and correct them by specifying the filtering rules.

For example, the organization uses its own mail server and use other SMTP servers not allowed to send mail corporate policy security. In this case, you should create a policy that will allow clients to use port 25 to connect only to their own mail server, and not to others. Such a policy, after its application, is guaranteed to exclude the possibility of sending spam from the organization's local network, even if computers nevertheless become infected with a new virus even before its description is added to Trend Micro's anti-virus databases.

Another example of solving the most common problem of uncontrolled access to global network resources. The danger in such access lies in the mechanism of infecting a computer with a virus, consisting of a bootloader, which, after launch, secretly downloads and installs its second part - the hacker's tools directly. It can be either a banal spam robot that will secretly send out thousands of emails a day, or utilities needed to hack into other computers. In the second case, it is very likely that hacks will be performed from the infected computer and the user or administrator will have to prove their innocence in the future, because all traces will be cut off on his computer. As a rule, the first part of the virus (loader) does not contain a virus code that can be uniquely identified, and performs only a few functions: download several files from a known server, unpack and prescribe them for automatic launch, run them and perform self-destruction. The fight against this type of virus is quite complicated and in practice there are situations when the antivirus does not detect the loader, but reacts only to the second part of the virus. In such a situation, infection does not occur, but the bootloader downloads up to several hundred kilobytes in a cycle with a certain frequency. If the user is not sufficiently qualified, the downloader will download its second part again and again, and in a situation where several machines on the local network are infected with the downloader, the company can detect a problem only after receiving bills for traffic at the end of the month. If the administrator has installed and correctly configured a proxy server on the local network to access the Internet through which the user is prompted to log in, then such a virus will not be able to download its second part.

You can create any number of exceptions in each policy, examples of which are already provided in the template. An example of a standard exception to allow a client to resolve names when DNS help shown in the figure below.

Exclusion settings are enough to create almost any rules.

After policies are created, they must be assigned to clients. You can do this using the settings on the "Profiles" tab.

Any policy can be assigned to any computer, IP address, user, and so on. An example of policy binding settings to be applied is shown below.

The administrator can select a specific policy from previously created ones or indicate the need to apply all policies; specify the IP address, their range or subnet to which the policy will be applied; select a domain from the list of OfficeScan clients, or specific computer; specify the version of the operating system installed on the client computer, the login name, and its status on the OfficeScan server.

In the "User Privileges" section, the administrator can allow the user to change the security level and edit the exclusion list.

Thus, the administrator can solve almost any problem of access control to network resources using only Trend Micro OfficeScan. It can, for example, allow most users to exchange traffic only between the user's computer, domain controller, local mail and proxy servers. This setting will deny access to other users' computers, all other servers, and so on. After that, the user, even using special software, will not be able to collect information about the structure of the local network, the number of computers, the roles they perform, and will not be able to provide other users with access to shared resources on his computer.

Other groups of users may be allowed to exchange traffic between computers within the group and access several more servers. A privileged group of users can have access to all computers and servers, except for a few. Such flexible traffic filtering will allow the administrator to build a truly secure local network. Moreover, protected not only from external threats but also from internal ones.

If an emergency situation occurs in the local network, when any of the client computers has become infected with a new type of virus and there is a threat of an epidemic in the local network, the administrator can use the Outbreak Prevention tool to fast limit or deny access to shared resources, as well as to certain ports.

After selecting one or more computers in the list, or the entire domain and clicking the "Start Outbreak Prevention" button, a wizard window will open that will offer you to configure blocking settings.

  • Limit/Deny access to shared folders- Restrict access to shared folders on protected computers and allow read-only, or deny access to such folders altogether;
  • block ports- An empty list will open where you can add port numbers to block. It is possible to add as certain ports, block incoming or outgoing traffic by protocols in port ranges, deny ICMP or all traffic in general;
  • Deny write access to files and folders- You can create lists of directories and documents (by type or by name) to which write access will be blocked.

After setting up all the locks, you need to specify the time for which they will be applied. The selection is available from 1 to 65535 hours. It's a good idea to inform users about enabling protection with a message, the text of which can be edited in the "Notification" field. After enabling Outbreak Prevention, Trend Micro OfficeScan clients will see a standard tooltip with this text above the Trend Micro tray icon.

updates

The Trend Micro OfficeScan component update settings are divided into two parts to separately control downloading updates to the OfficeScan server from Trend Micro servers, and updating OfficeScan clients.

A summary of the up-to-date statistics for all OfficeScan components is displayed in a report, an example of which is shown in the figure below.

An administrator can set up automatic, scheduled downloads of updates from Trend Micro servers and perform an out-of-order manual update. On the Update Source page, you can specify the Trend Micro server or any other server as the source for receiving updates. Using the second option, the administrator can set up a centralized update of the company's branches from one, his own server. In addition, the address can be specified as a source for receiving updates. shared resource on the local network, access to which can be restricted by a password.

When configuring OfficeScan client updates, you can choose to update databases and components immediately after they are downloaded by the OfficeScan server. After updating the databases, it is possible to enable forced scanning of users' computers to search for the latest viruses.

In addition to updating client computers according to a schedule, it is possible to run them forced update manually. In this case, you can force updates only on clients with outdated versions components and bases, or manually select clients to update.

The source for clients to receive updates can be either the OfficeScan server or any other server that the administrator can manually list.

Another useful feature of Trend Micro OfficeScan is the presence of a module with which you can store on the server previous versions virus definition databases and client side. If necessary, the administrator can at any time restore any of these components to the state that preceded the last update.

Installing Trend Micro OfficeScan Client

Trend Micro has provided the local network administrator with several ways to install the OfficeScan client:

  1. Manual installation from a share
    If there are few computers on the local network, you can start the client installation from the share created during the Trend Micro OfficeScan installation. Administrator rights are required for installation. Manual installation comes down to launching the AutoPcc.exe file, after which the client-side installation wizard will be launched. It will check the client computer and install all necessary modules, after which the OfficeScan icon will appear in the tray.
  2. Manual installation via HTTP
    To install, you can use the link that is generated on the authorization screen to enter the web console. It looks something like this: https://server:4343/officescan/console/html/ClientInstall/ For this type of installation, you also need to have administrator rights on the computer. After installing the ActiveX component, the following page will open in the browser:

    After clicking the "Start installation" button, a wizard will be launched that will help you install the client part. A link for this type of client-side installation can be mailed to users. For automatic creation You can use the “Networked Computers - Client Installation - Browser-based” menu item in the web console to send an email with a link. On the wizard page, you can enter the name of the subject of the letter in the field and it will be automatically generated. A link to install the client will be inserted into the body of the email.

  3. Manual installation via web console
    Perhaps this is the most best option manual installation. In the web console, select the menu item "Networked Computers - Client Installation - Remote".

    All computers on the local network will be displayed in the left list. They can be added to the list on the right using the corresponding button, and after clicking the "Install" button, the OfficeScan client will be installed on these computers. If the computer on which you want to install the client part is not included in the domain (or there is no domain), then when you try to add such a computer to the list on the right, you will first be prompted for a login and password. If the installer manages to authorize on the selected computer, the machine will be added to the list for subsequent remote installation of the OfficeScan client. Because client installation requires Account with administrator rights, then you should enter the details of just such an entry. Perhaps the only downside this method installation is that the list on the left does not highlight the computers on which the OfficeScan client is already installed. Although after launching the installer checks for the presence of installed on remote computer OfficeScan client, and if it finds it, it aborts the installation with the appropriate error message. Another feature of this type of installation is the need to first disable the "Simple public access to files." If this is not done, the computer cannot be added to the installation list.

  4. Automatic installation using a login script
    In a domain, the administrator can assign each user a login script (.bat file) that contains a string to start the OfficeScan client part in automatic mode. The line launches AutoPcc.exe from the shared resource, as mentioned in the first paragraph. For automatic change For many logon scripts, there is a Network Logon Script Configuration utility that can be accessed from the Start menu. Page from detailed description The steps for modifying user login scripts are opened by selecting the "Tools - Administrative Tools - Login Script Setup" menu item in the Trend Micro OfficeScan Web Management Console.
  5. Create an unattended package
    From the web console, selecting "Tools - Client Tools - Client Packager" from the menu, the administrator can access instructions for creating packages for distributing the OfficeScan client. The ClnPack.exe utility is located at PCCSRVAdminUtilityClientPackager in the directory where OfficeScan is installed.

    From the Package Type combo box, you can select one of the following values:

    • Installation- will be created executable file(.exe) to install the client part on the user's computer for the first time.
    • Update- an executable file (.exe) will be created to update the client part.
    • MSI- the package will be created in MSI format for further imposition on users' computers via group policies or via Microsoft SMS.

    From the "Operating system" combo box, you can select the bitness of the operating system for which the package is being created (32 or 64).

    Thus, the OfficeScan administrator has a tool at his disposal, with which he can create a package for distributing the client part to network computers, regardless of their geographical remoteness, data transfer speed, number of computers, and Windows versions. After the package is created, the administrator can create in the domain group policy and with its help, automatically install the client part on all computers. If the company has remote branches, then the administrator can burn the resulting package to a CD and transfer it to the branch for installation. After running the package in a branch office, the OfficeScan client will be automatically installed, configured to use the OfficeScan server, and registered in the server's management console.

  6. Installing operating systems by cloning
    If the company uses the method quick installation operating systems by deploying them from pre-prepared images, a number of simple steps are required to include the Trend Micro OfficeScan client side in the image. After the source computer is fully prepared for cloning (operating system installed, updates, office suite and other software), you need to run the ImgSetup.exe utility on it. You need to run it from the network share that was created during the installation of Trend Micro. The utility is located in AdminUtilityImgSetup. After starting, the utility will register its call in the registry, after which you can remove the image from source computer. After the image is deployed to a new computer, the first time it is turned on, the utility will run and use it to provide the OfficeScan client with a new global identifier (GUID) required for each client to communicate with the OfficeScan server.

Thus, Trend Micro provides administrators with enough tools to install the OfficeScan client on any number of computers in a wide variety of network configurations.

Configuring the Trend Micro OfficeScan Client

Using the OfficeScan Web Based Management Interface, an administrator can centrally deny or allow users to manage various settings client side on your computer. Settings can be set separately for the domain and each client. It is recommended to disable all features as much as possible at the domain level, and then allow only what is necessary for certain users at the computer level.

The user rights settings are shown in the figure below.

As you can see, the rights can be changed from the level "everything is prohibited" to "everything is allowed". If the administrator has not disabled the ability to open the client side console on the user's computer, then after double-clicking the Trend Micro OfficeScan tray icon, he will see a window, an example of which is shown below.

Again, if the administrator has not prohibited the opening of the console, then by selecting from context menu opened by right-clicking the Trend Micro OfficeScan tray icon, the OfficeScan Console item will allow the user to open a window as shown below.

Depending on the access to which features is allowed, the number of tabs in this window, as well as the settings on them, may be different. This is true both for real-time anti-virus protection settings and for on-demand file scans. Unloading the client part and its complete removal from the user's computer can be password protected.

Conclusion

Trend Micro offers a product that has become more than a corporate antivirus. OfficeScan, in addition to anti-virus functions, also performs the role of a firewall, providing the administrator with a tool for flexible control of traffic on the local network, and for the management - an overall reduction in the total cost of ownership of the solution. An advanced logging system, a convenient and intuitive interface accessed via a browser, automatic division of clients into those working in the local network and outside it with the application of different policies to them, control over the security of sites visited by the user and ease of deployment of the client part in networks of any size allow you to effectively use the administrator's working time. OfficeScan Central Update and Management System, Quick Selective Blocking Tools network traffic, a large number of notifications different ways about problems and threats that can only arise in a local network, allow us to reduce the task of ensuring anti-virus security to corporate network to the “set it and forget it” principle.

You can uninstall Trend Micro Antivirus standard means Microsoft Windows or using a special utility.

Choose a deletion method:

To remove a third-party antivirus yourself using standard Microsoft Windows tools, follow these steps:

Specify the operating system. For operating room users Windows systems Vista/7. For users of the Windows XP operating system.

Start»;

2. Select the menu item " Control Panel»:

3. In the window " Control Panel" Choose a section " Programs and Features" (or section " Programs", and then - " Programs and Features»):

4. In the window " Programs and Features

5. Double-click the left mouse button on the program name;

6. Confirm that you really want to uninstall the program;

7. In the opened window of the antivirus removal program Trend Micro click " Delete»:

8. Wait for the deletion to finish:

9. After the end of the removal of the antivirus Trend Micro click " Reload Now

Program Files

1. In the lower left corner of the screen, click on the " Start»;

2. Select the menu item " Control Panel»:

3. In the window " Control Panel" Choose a section "":

4. In the window " The installing and deleting of programms» select the program to be removed;

5. Click on the " Delete” (or the button “ Change»);

6. In the opened window of the antivirus removal program Trend Micro click " Delete»:

7. Wait for the deletion to finish:

8. After the end of the removal of the antivirus Trend Micro click " Reload Now» to restart the computer:

When you remove a third-party antivirus using standard Microsoft Windows tools, some folders and files may remain in the system, so you need to check the folder " Program Files' after restarting the computer. If the folder contains folders and files of a third-party antivirus, then they must also be deleted and the computer restarted again.

You need to try uninstalling your antivirus first Trend Micro using standard Microsoft Windows tools.

In some cases, after removing the antivirus Trend Micro and restarting the computer system registry the operating system may have entries that make it impossible to install the antivirus ESET NOD32.

To resolve this situation, follow the instructions:


1. Save the special utility (file 32bit.exe or 64bit.exe) on the desktop of your computer:

2. Run the file 32bit.exe (or 64bit.exe);

3. In the window that opens, go to the "Uninstall" tab and click " 1.Uninstall software»:

4. In the next window, click "Uninstall":

5. Wait for the uninstallation to complete and click "Yes" in the computer restart prompt window:

ESET does not take responsibility for the result of this utility, as this software provided by the developer of the third-party antivirus.
We strongly recommend that you seek help from experts when using a special utility to remove a third-party antivirus.

If you need help removing a third-party antivirus, you can contact our free technical support.

Trend Micro- universal control content security solutions such as antivirus, anti-spyware, anti-spam, anti-phishing, content filtering, information leakage prevention solutions

List of programs

Trend Micro Antivirus Plus
Antivirus and web protection using the cloud-based Smart Protection Network for fast and reliable protection from malware and websites, phishing and other online threats

Trend Micro Internet Security
Comprehensive antivirus using Trend Micro cloud technologies. Reliably protects against malicious sites, prevents the theft of important data and ensures privacy on the Internet and parental control

Trend Micro Maximum Security
Complete solution from Trend Micro for maximum protection against malware, online threats, theft or loss of data. Antivirus and web protection with cloud technologies, parental control, secure data storage

Trend Micro Dr. Safety for Android
Free antivirus for Android smartphone or tablet. Includes Virus & Identity Scanner, Theft & Loss Protection, Malicious Web Protection, Call & SMS Filter, and Heartbleed Vulnerability Scanner

Trend Micro Mobile Security for Android
Trend Micro antimalware technologies in antivirus Mobile Security for Android protect your smartphone from the latest threats. You can also block unwanted calls and sms, use the internet safely

Trend Micro HouseCall
Free cloud scanner on-demand, quickly checking critical system areas and active malware using cloud network Trend Micro Smart Protection Network

Trend Micro HouseCall for Home Networks
Scan tool home network, to identify potential security threats and vulnerabilities that your connected devices may have

TrendMicro Password Manager
Password manager solution for safe storage passwords and confidential information, offering access to data from PC, Mac and mobile devices Android, iPhone and iPad

Trend Micro Fake Antivirus Remover
Trend Micro Anti-Threat Toolkit - Fake Antivirus Remover is a free utility that helps you remove fake antiviruses (FakeAV) from your computer. Updating at the start of the scan ensures that the database of fake antiviruses is up-to-date

Trend Micro Internet Security for Mac
Easy-to-use and effective antivirus protection from Trend Micro. Includes web protection against malicious and phishing websites, parental controls to restrict access to unwanted resources

Trend Micro BotPanda Cleaner for Android
A utility that is compatible with other antiviruses and allows you to check your Android device for a mobile phone. malware BotPanda.A

Trend Micro Browser Guard
Proactive browser protection against new web threats. Browser Guard 2010 prevents zero-day vulnerabilities and protects against malicious JavaScript code using technologies of predictive and preventive web content analysis

Trend Micro Rootkit Buster
Free anti-rootkit. Checks the system for hidden threats- rootkits and reliably removes detected malicious objects and files

Trend Micro Worry-Free Business Security
Antivirus and anti-spam for small businesses. Trend Micro Worry-Free Security solutions protect your business assets and customer data by blocking all forms of network threats, spam and other dangerous software: viruses, worms, spyware

licensed Trend policy Micro

Trend Micro products, depending on the line and edition, are licensed by the number of workstations (users) and servers. Trend Micro software customers receive a permanent license to use these antivirus products. The product license is accompanied by a one-year license to receive virus signature and software updates, as well as phone and email consultations.

To continue technical support after the first year, you need to buy a subscription renewal (discount is 30% off the current price of the product). In the case of renewal of technical support in the presence of overdue months, the customer must pay the cost of renewing technical support for these months as well.

Licensing of small, medium and big business

Products for small and medium businesses are licensed by the number of protected computers. File and mail servers are licensed in the same way as workstations. Internet gateways are licensed according to the number of computers with Internet access. The minimum order quantity for Trend Micro SMB licenses is 15 users (workstations).

Products for large businesses are licensed by the number of users directly or indirectly protected (the number of servers is not taken into account). The minimum order quantity for Trend Micro licenses for products for large organizations is 25 users (workstations).

Discounts for government, non-profit and academic organizations. Competing transition

Discounts require prior approval from Trend Micro. The customer must provide the customer's company name, estimated purchase dates, and list the Trend Micro product name and number of licenses.

In a competitive transition, the customer must meet the following conditions:

  • Possession of a valid license for a competing product (provision of a copy of the license upon request).
  • The functionality of the products (competing and Trend Micro) should be the same.
  • The number of licenses (competitor and Trend Micro) should be approximately the same.

Purchasing additional licenses

Trend Micro customers with an active support contract are eligible to purchase additional licenses at a price range corresponding to the total number of licenses (existing plus new). In this case, it is required to unify the technical support end dates for activated and new licenses. When purchasing new licenses, you must additionally purchase an extension of technical support for existing licenses for a period up to the end date of technical support for new licenses.

Top Related Articles