Detailed instructions for use are in the User's Guide.
[. . . ] Home Network Security Services
Version 1. 1
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The Trend MicroTM Home Network Security Services User's Guide introduces the main features of the software and provides installation instructions. Trend Micro recommends reading this guide in its entirety prior to installing or using the software. NOTE: A license to Trend Micro Software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. [. . . ] Select a subscription quantity according to the number of computers on your network. For example, if there are three computers on your home network, select 3-4. 7.
3-2
Chapter 4
Using the Trend Micro Dashboard
This chapter has the following sections: · · · · Starting the Dashboard on page 4-1 Using the Service Summary Screen on page 4-1 Using Security Scan and Anti-Spyware on page 4-5 Using the Parental Controls screen on page 4-11
Starting the Dashboard
To start the dashboard, click Trend Micro Security Services in the Start menu or the in your browser's toolbar. icon icon in the top-right corner of the
Using the Service Summary Screen
On the Service Summary screen, you can: · · · · · · · · Renew your services Download Trend Micro Internet Security Log in to the router setup screen Access your Trend Micro customer account Scan your computer for viruses Get technical support Get antivirus and computer security information Change your user account
To access the Service Summary screen (Figure 4-1), start the dashboard and then click the Service Summary tab.
4-1
Using the Trend Micro Dashboard
FIGURE 4-1.
The Service Summary screen
Renew your services
To renew your Trend Micro Internet Security and Parental Controls services, click Buy/Renew and then follow the instructions in Renewing Your Services on page 3-1.
Download Trend Micro Internet Security
To download Trend Micro Internet Security, click the download link in the My Services area of the Service Summary screen. For detailed downloading and installation instructions, refer to Installing Trend Micro Internet Security on page 2-8.
Log in to the router setup screen
Parental Controls are configured on your router's setup screen. To access router setup, click Log in to the router setup screen and then type your router's user name and password. On the setup screen, locate the Parental Controls configuration area.
4-2
Using the Trend Micro Dashboard
Access your Trend Micro customer account
To access the Trend Micro Customer Care Center, click Log in to your Trend Micro customer account. In the User ID box, type the email address you used to register your customer account. In the Password box, type the password you chose when you registered your account. At the Customer Care Center you can buy and renew services, manage your customer account, and access product information.
Scan your computer for viruses
To scan your computer for viruses from the dashboard, click HouseCall and then follow the on-screen instructions. If you think your computer is infected with a virus, click I think my computer is infected, what should I do?and then follow the on-screen instructions for assistance.
Get technical support
To search the Trend Micro Knowledge Base:
1. 3.
On the dashboard's Service Summary screen, click Search our Knowledge Base. For information about Trend Micro Internet Security, return to the product list and click PC-cillin Internet Security. For information about Trend Micro Internet Security, click PC-cillin Internet Security.
To view frequently asked questions:
1. 2.
To view the latest version of this User's Guide, click Download User's Guide.
Get antivirus and computer security information
The Service Summary screen provides links to the following general information: · · Antivirus and security tips Free newsletters on computer security
4-3
Using the Trend Micro Dashboard
· ·
The Trend Micro Virus Encyclopedia Details of recent virus outbreaks and other Internet security threats. To view this information, click the name of a threat under "Top Threats Worldwide" or click View all.
Change your user account
To change the Trend Micro user ID that is assigned to your router, click the "If you are not. . . " link in the Online Support area of the Service Summary screen (Figure 4-2).
FIGURE 4-2.
Change user link
4-4
Using the Trend Micro Dashboard
Using Security Scan and Anti-Spyware
On the Security Scan screen, you can: · · · View individual computer and network-wide security reports Detect and remove spyware Get an overall risk assessment, details of what Security Scan checked, and tips for fixing any problems found
To access the Security Scan screen (Figure 4-3), start the dashboard and then click the Security Scan tab.
FIGURE 4-3.
The Security Scan screen
Generating a Security Scan report and removing spyware
To generate a Security Scan report and remove spyware, click Scan Now. If spyware is found, you can remove it using Anti-Spyware.
4-5
Using the Trend Micro Dashboard
FIGURE 4-4.
Sample Security Scan report
For information on vulnerabilities found and suggested solutions, click Show. Select the spyware programs you want to remove (see the example in Figure 4-5), and then click Clean. To remove all spyware programs, click Select All and then click Clean.
4-6
Using the Trend Micro Dashboard
FIGURE 4-5.
Spyware detection example
Generating a network-wide security report
To generate a security report for your entire network, first do a Security Scan on all of your computers. After scanning all of the computers on your network, click Generate Report. On the network security report screen, click Show to view information on vulnerabilities found and suggested solutions.
Note: For a complete network security report, you must first do a Security Scan on all computers. [. . . ] Sites providing information on illegal or questionable access to, or use of, communications equipment and software, or that provide information on how to bypass proxy server features or gain access to URLs in a way that bypasses the proxy server. Sites that promote, offer, sell, supply, encourage or otherwise advocate the illegal use, cultivation, manufacture or distribution of drugs, pharmaceuticals, intoxicating plants and chemicals, and related paraphernalia.
Alcohol/Tobacco
Gambling
Hacking/Proxy Avoidance
Illegal Drugs
5-3
Using Parental Controls
Category Illegal/Questionable
Description Sites that advocate or give advice on performing illegal acts such as service theft, evading law enforcement, fraud, burglary techniques, and plagiarism. Also includes sites that provide or sell questionable educational materials such as term papers. Sites that sell or contain images of swimsuits, intimate apparel, or other suggestive clothing. [. . . ]