How to activate Trend Micro Maximum Security? - PowerPoint PPT Presentation

About This Presentation
Title:

How to activate Trend Micro Maximum Security?

Description:

Trend Micro Activation: Protect your Device & Enjoy Premium Security The goal of computer security is to prevent unauthorized access to your computer and detect it if it occurs.You can restrict access to your device from anywhere by implementing an inhibition measure. You can use detection to determine whether or not someone attempted to break into your computer, and what they did if they were successful. – PowerPoint PPT presentation

Number of Views:28

less

Transcript and Presenter's Notes

Title: How to activate Trend Micro Maximum Security?


1
Installing Trend Micro AV on Your Personally
Owned macOS Device
If any antivirus software is currently installed
on your computer, you must uninstall it for
Trend Micro to function properly. .
2
First-time Installation and License Activation
of Trend Micro for Mac
If any antivirus software is currently installed
on your computer, you must uninstall it for
Trend Micro to function properly. .
3
Trend Micro Maximum Security.
PERSONALLY OWNED MACOS DEVICE
Move towards the UW Madison Software Library and
select Trend Micro Maximum Security. Agree to
the license terms by clicking the Trend Micro
security button. In the next few minutes you
will receive an email containing your one year
licence key.
4
Installation od Deep Security Manager
Window hosts will now appear as
dsm.testlab.local within the domain
testlab.local. The latest version of a deep
security manager is then downloaded from the
download center of TrendMicro.
5
After choosing your installation language click
on ok. To run a production environment, the
pre-installation check is noticing that VM is
not configured with enough resources. However,
this is a demonstration so it shouldnt be a
problem as of now. Then, click next Thoroughly
go through the license agreement and click accept
radio button when you agree to the conditions.
Then, proceed with clicking next. To check
whether there's a previous version installed,
the upgraded version is run. A new installation
is starting in this demo environment. You may
proceed to change location according to your
preference and then click next. Some required
details like database hostnames, database
instances would be required to fill up. However,
for demo purposes currently, embedded
installation is being used. Please note that
using the embedded database for the production
environment, as the installer will not accept it
and might also remind you the same.
6
Now, enter the activation code. You are only
supposed to change Hostnames, IP addresses, and
port names when your environment somehow uses
the ports required. Or else you can click
next. To click next, first, configure your
account and click next. Configure your security
updates in this step. This creates a scheduled
task for security updates (and updates your
procedures accordingly). As this is a demo
environment, no proxy server is used to access
Trend Micro for security updates. Next, configure
the same scheduled task for the software
updates. For distributing definitions and
updates to the protected agents and virtual
appliances in your lab environment, enable a ray
agent. For the production environment, you can
install it in one or multiple environments
separate servers. However, in a demo environment,
it will be installed in the management
server. For the demo environment, smart feedback
will be disabled. When a summary shows up on your
screen with all the installations, confirm that
everything is configured correctly before you
begin the installation.
7
Once you are done with the installation, you
would need to allow DSM console to open and click
finish. Once logging in to deep security
customer takes place, the dashboard will be shown
up.
Deep Security Manager Configuration In this lab,
first, add the vCenter installed earlier.
Navigate to the "computers" tab, right-click
"computers" (on the leftmost menu) and select
"add VMware vCenter". Enter configuration
Details. After configuring Deep Security in
vCenter, you need to deploy the virtual
appliances for agentless protection. We won't
have to deploy the filter driver since we are
using vSphere 6 with Trend Micro Deep Security
9.6. I recommend you be aware of this if you have
been using older versions of Deep Security and
vSphere. The first step is to import the vSphere
security appliance. Download the 9.5 virtual
appliances here. Once the download is completed,
open- Administration go to updates-gtsoftware-gtlo
cal. Import the file downloaded.
8
Once you import the package, open your vCenter in
the computers view, then drill down to hosts
and clusters. right-click the host you want to
protect and select actions -gt Deploy agentless
security.
  • Select the details of employment once you enter a
    name for the appliance.
  • Enter your network configuration.
  • You can provision the Virtual appliance as thick
    or thin (according to your preference), and wait
    for the deployment to complete. Once that is
    complete, you can activate the Virtual appliance.
  • After doing this, the agent will appear in the
    list of computers, and you can activate virtual
    machines without installing the agent.
  • Agent-based protection
  • The first step is to add our Active Directory to
    Deep Security Manager. While you can protect
    systems without an active directory, this makes
    deployment significantly easier. Adding a new
    directory is as simple as clicking "Add
    Directory" and entering your AD details. From the
    left-hand menu, click "Computers", and then
    right click "Computers".

9
Next, create a scheduled task to synchronize the
directory The agent will have to be imported
next. Navigate to "Administration" and then
update -gt software -gt download center. Type
"Windows" into the search bar. Select the latest
agent version, then right-click and choose
"Import". When the import is complete, select
Support in the top right corner of the
management console, then click on Deployment
scripts. Find the script for your platform and
copy it. As a result of adding our active
directory, we should be able to see the
computers associated with the domain. Check that
you can see your computers by opening the
computers tab and browsing through your list of
computers. Normally an agent is deployed through
a management tool or preinstalled in an image in
a production environment, but in this case, the
manual installation will be enough. Activate or
reactivate the agent by clicking on the Actions
-gt Activate/Reactivate link in the deep security
manager after the agent has been
installed. Within a few minutes, the status of
your machine should change to "managed (online),"
and your virtual machine will be protected by
Trend Micro Deep Security. The Deep Security
software enables you to enable features such as
anti-malware, intrusion prevention, firewalling,
and other security products by opening the
details of a protected computer (or by creating a
policy). As soon as you have this setup, you are
ready to begin testing the product and its
extensive set of options to protect your
environment.
10
Do you have any questions? Please Call
Us On Toll Free No 61-872-000-111
Write a Comment
User Comments (0)
About PowerShow.com