Home
Trend Micro Titanium Maximum Security User Manual
Contents
1. protection Learn More about Windows Accounts sen 8 Parental Control settings Parental Controls Controls WeEDSIe eer Rules Website Filter The Parental Controls let you filter different Selecting an age from the list automatically blocks certain website categories but you can also customize the list by clicking categories of websites based on three age groups en 3 7 Child 8 12 Pre teen and 13 17 Teen The wi em list below shows which specific categories are blocked by default for each age group Select an age Ages 3 7 Child Adult or Sexual more info Erotic Mature v Gay Lesbian l Intimate Apparel Swimsuit Nudity Pornography Sex Education Communications or Media more info Blogs Web Communications Chat Instant Messaging w Hacking Proxy Avoidance v Email bet OY kan cha 9 Parental Control settings Age Group Categories Blocked Ages 3 7 Child All categories are blocked by default for young children Adult or Sexual Controversial m Erotic Mature Abortion n Gay Lesbian Criminal Questionable n Intimate Apparel Swimsuit Cult Occult n Nudity Ilegal Drugs i m Pornography Violence Hate Racism Ages 8 12 Pre teen Sex Education Communications or Media m Hacking Proxy Avoidance m Personals Dating Social Networking Aduit or Sexual Li Erotic Mature n Nudity Ages 13 17 Teen Pornography Communications or Medi
2. to it and click the Remove button I L 29 Protection settings Protection Settings Virus amp Spyware Controls pau Extra Security Security software drivers will load as soon as the computer starts which Internet amp Email Controls makes the operating system launch more slowly Balanced Protection Only some security software drivers will load when the computer starts to reduce delays Exception Lists Other Settings Extra Performance Security software drivers will load only after the computer has started to help the operating system launch more quickly System Startup Proxy Settings Smart Protection Network Password eC Cancel 30 Protection settings Protection Settings n Virus amp Spyware Controls se Use a proxy server to connect to the Internet Internet amp Email Controls a Use Internet Explorer proxy settings E Enter the necessary proxy serwer settings Exception Lists Use an automatic configuration script Other Settings System Startup Proxy Settings Smart Protection Network Password Your security software can load drivers and services gradually to help your computer start up as quickly as possible or load them all immediately to provide the strongest security as soon as possible e Select Extra Security if you care most about protecting the computer as much as possible as soon as possible You might ha
3. Trend Micro Titanium Maximum Security User Manual 1 Main Panel Trend Micro Titanium Maximum Security In the main panel by a large icon and the bar has been protective level of your computer and below it there are three main areas of security and status indicator on your license Protected Security Summary when use this menu there You have access to the latest protection is appearing new window which is showing Security Report Parental Controls System Tuner Y Security Summary 10 threats stopped in the past month Subscription Viruses amp Spyware 3 stopped Web Threats 7 stopped gt Parental Controls gt System Tuner In Security Reports can see detailed reports with a graphical interface for number of viruses Threats found 0 W spyware and web threats over time Es Period Pastmonih By selecting View detailed logs can be seen e inn reports for all zaprahi zarpredeleni stopped by If using Microsoft Internet Explorer never set the E Viruses Security Level below Medium category 0 0 0 Last Scan LA Spyware 0 0 0 Viruses System Tuner E Web threats Spyware eee n Browser Cookies ka i 10232010 oe Threat History Web Threats Parental Viruses 0 Data Thief Prevention Controls Spyware 0 Updates Web threats 0 Secu re Erase WIFI Advisor ze 10 4 2010 10 2010 10 24 2010 System Tuner All ve Viruses ve Spyware v Web threats Parental Controls Network S
4. a m Hacking Proxy Avoidance Weapons Military Shopping and Entertainment m Alcohol Tobacco E Auctions m Gambling Controversial m Criminal Questionable m Illegal Drugs a Violence Hate Racism Shopping and Entertainment a Alcohol Tobacco l Gambling You can add or remove categories for any age group just by clicking the checkboxes next to any category on the list 10 Parental Control settings Parental Controls Controls You can setup time interval when to be valid written rule and restriction for access Rules Web Access Schedule Click the timelines to highlight when your children may access the web Clicking a highlighted area will remove it Mi pe Weekdays Monday Friday 12 2 6 8 L AM Weekends Saturday Sunday ee 1 eN EEE Cancel 11 Parental Control settings System Tuner optimizes your computer s performance and helps protect your privacy on the Internet Before making any changes System Tuner also backs up your system settings system Tuner Introduction System Tuner can help you recover disk space make Microsoft Windows start faster clean up your instant messaging history and optimize your computer s performance You can even plan scheduled tune ups that can automatically keep everything running smoothly With System Tuner you can easily get the most out of your computer Don t show this introduction again crew v 1 OK 12 Parental Co
5. ay Don t show this introduction again Pitti an 17 Trend Micro Vault file protection Trend Micro Vaut Micro Vault aa kal oz The Trend Micro Vault keeps confidential files safe so that no one can access them without permission Reporting a Loss Ifyou lose this computer please seal your Trend Micro Vault by visiting this site http iww trendsecure com You should bookmark this address on another computer or write it down for future reference Regaining Access After recovering a lost computer you can unseal the Trend Micro Vault only after validating your identity You should then change your password justin case OK This tool can protect sensitive personal information such as credit card numbers or passwords for online services Upon detecting any attempt to send protected information to the Internet whether to a web page by email or through an instant message the transmission can be blocked automatically Data Theft Prevention monitors HTTP traffic ports 80 81 8080 and any proxy server port you configure in your Microsoft Internet Explorer settings but not HTTPS traffic encrypted information cannot be filtered The Trend Micro Vault helps keep your sensitive files secure You can easily block casual access to files in the vault or seal the vault completely if your computer is lost or stolen The Trend Micro Vault requires a password to open files inside It regularly checks onl
6. deleted file seven times This option usually takes longer but offers the most secure way to remove data from your computer 14 Data Theft Prevention Data Theft Prevention Introduction Data Theft Prevention prevents hackers and spyware from stealing sensitive data like credit card numbers passwords and email addresses It can also stop children from accidentally sending out personal information through email via instant messaging or to untrustworthy websites Don t show this introduction again button menu e Instant messaging privacy To help maintain your privacy online System Tuner can remove chat histories recent screen names lists of files downloaded transaction logs and other information generated by using Windows Live MSN Messenger AOL Instant Messenger AIM and Yahoo Messenger When you delete a file Microsoft Windows just removes the directory information used to find it The actual data still remains on your hard drive and potentially available to someone with recovery tools After switching on this feature mark the radio button to indicate what level of security you want from Secure Erase e Quick Erase will overwrite your unwanted files with random data so that nobody can easily open them again e Permanent Erase can overwrite files with random data seven times for extra peace of mind and meets United States Federal Government standards for data security You can then
7. e adi edas Unauthorized Change Prevention These logs can be exported and saved with button export 3 System tuner System Tuner service can help you recover disk space can make the launch of Microsoft Windows more quickly to clear your stories of Security Report Last tune up instant messaging programs and to optimize the eee performance of your computer You can even Summary adjust automatically improve the performance of B your computer and make his work more smooth Disk space recovered and seamless ane J More of that data link What is System Tuner Farental Controls Whatis System Tuner m Show this report monthly View detailed logs 4 Parental Control Parental Control gives you ability to determine how people use the Internet from this computer You can prevent certain categories of sites to be opened may be limited Internet access for a number of visits per day You can also create Websites blocked in the past month Account All We Threats i rules that apply only for a person who enters this A computer Detailed description of settings and ERA vazmovnostite below B Parental Controls Top Websites Blocked No information available Show this report net 2010 View detailed logs 5 Tools Form Tools button in main screen you can access Trend Micro Titantum Maximum Security Parental Controls System Tuner Data Th
8. e from three types of scans e Quick Scan Scans only the places where threats commonly hide e Full Scan Scans the entire computer including any external drives except network drives e Custom Scan Scans everything in the folders that you select Keep your computer protected Your security software analyzes basic information about every file that you open save or download For threats like viruses it attempts to remove the threat from the infected file If unable to remove the threat it deletes the infected file along with the threat IM Mark the Scan for threats when opening saving or downloading files checkbox to detect and eliminate security threats automatically Stay informed when something important happens Important warnings appear when your security software deals with a threat lM Mark the Display a warning after detecting viruses spyware or suspicious behavior checkbox to make sure you see these messages Schedule automatic scans Some threats may remain hidden or dormant on the computer for a long time before they act Your security software can find and stop such threats before they start to cause trouble Mark the Conduct a scheduled scan of the computer checkbox to check your files and settings for hidden threats Use the lists under the checkbox to select when the scan should begin Choose a time when you would normally not use the computer very much after switching it on like lunchtim
9. e on a Friday Maximize your protection Your security software can not only search for threats in files and settings but also check for suspicious behavior on your computer Mark the Check if programs try to make unauthorized changes to system settings that could threaten your security checkbox to block suspicious changes Such changes can result in Web browser hijackings unwanted but unremovable Web browser toolbars or reduced computer performance among other problems Mark the Prevent programs on portable drives from launching automatically checkbox to block programs that try to start running without your permission when you plug a USB drive into the computer Flash memory or other portable USB drives rarely include certain kinds of programs that launch automatically so they usually represent a threat if found If you have strong concerns about your security then you can take even stronger measures against threats Mark the Check compressed files such as ZIP files during real time scans checkbox to check files reduced in size through data compression techniques Such files commonly end with the ZIP or RAR extension and require a specific program to unpack unzip or decompress the contents IM Mark the Automatically delete files that show any signs of a threat checkbox to get rid any file that might cause trouble This aggressive response could remove some harmless files along with the unsafe o
10. eft Prevention Secure Erase l Status OFF Data Thief Prevention Trend Micro Vault Free Tool Center Trend Micro Vault Status OFF _ Secure Erase Free Tool Center 1 Status OFF i no AL ex You can choose Parental Controls from main a screen ot after press Tools button then you can access Introduction screed for setting up feature introduction for Parental controls You can easily protect your children from inappropriate websites limit their time on the internet and see detailed reports about what they do online without having to look over their shoulders Don t show this introduction again 7 Parental Control Parental Controls Getting Started Get Started The first time you try to use the Parental Controls Have you set up any separate Microsoft Windows User Accounts on this computer for your kids you will be asked if you have set any separate lf you use only one password for this computer or no password at all then answer No and click Next Microsoft Windows User Accounts on the No or not sure computer By setting up separate accounts for your kids you can configure different rules for them by pwa linking each Windows User Accounts to the Parental Controls Otherwise the same rules will Yes apply to everyone using the computer mwa ao Whether or not you have set up separate user accounts the Parental Controls will then walk you through the process of setting up the rules for this
11. g the registry can affect your computer s stability and performance Sometimes they can even prevent you from installing applications or starting Windows System Tuner can find and remove unneeded registry entries e Internet privacy Websites use small text files called cookies to provide you with customized content or services Your browser history lets you easily revisit websites However someone could also use this information to identify your computer and analyze what you view on the Internet To help protect your privacy System Tuner can delete cookies and browser history entries e Software histories To help prevent spyware from gathering information about your computer System Tuner can delete lists of files recently opened by Windows Microsoft Office software media players Windows search and other programs It can also delete the lists of files or programs recently opened from the Windows Start 13 Secure Erase Secure Erase Use Secure Erase to delete unwanted files so that nobody can ever open them again To use this feature right click any file and select Delete with Secure Erase J Type of Erase z CED Quick Erase Moving a file into the Recycle Bin does not immediately delete all of the data it contains The Quick Erase option overwrites a deleted file to prevent it from being recovered later Permanent Erase The Permanent Erase option gives extra peace of mind by overwriting the
12. ine to find out if you have reported the computer as lost or stolen If that happens the Trend Micro Vault automatically seals shut blocking access to everything inside even if someone has the correct password 18 Main Panel scanning Pao L Support Trend Micro Titantum Maximum Security Protected Thank you for trying Trend Micro Titanium Maximum Security This free trial will expire on 11 23 2010 Y Security Summary QO threats stopped in the past month Viruses amp Spyware 0 stopped Web Threats 0 stopped l System Tuner Last tune up None l Parental Controls pwan Setup now Quick Scan gt Subscription Full Scan Expires on 14 23 2010 Custom Scan Q Scan BEJ I a END 19 Protection settings Tools a Protection Settings TEN a O se Scan for threats when opening saving or downloading files Internet amp Email Controls 5 Make real time scanning check compressed files like ZIP files Automatically delete files that show any signs of a threat Exception Lists we Check if programs try to make unauthorized changes to system settings that could threaten your securi Other Settings r y Prevent programs on portable drives fom launching automatically se Display a warning after detecting viruses spyware or suspicious behavior se Conduct a scheduled scan of the computer at 12 00 PM Last scan 10 23 2010 Every Friday You can choos
13. ls Internet amp Email Controls Exception Lists Programsifolders Websites Wireless connection Other Settings Scans and other kinds of monitoring will ignore anything you add to the list se Add Mk remove Name Type Cancel If you use email software on your computer then you can use this feature to intercept unwanted email messages ve Mark the Filter out unsolicited advertisements and other unwanted email messages checkbox to activate the Trend Micro Anti Spam toolbar in supported versions of Microsoft Outlook Microsoft Outlook Express and Windows Mail Programs folders You can use this exception list to speed up scans by making them ignore specific files or folders that you already consider safe 25 Protection settings e Click the Add button to open a window for selecting a file or folder to put on the list You can only add one file or folder at a time Add an Item e You can only use the Remove button after Click Browse to find a file or folder that belongs on the list marking the checkbox next to at least one thing Browse on the list a N 26 Protection settings Protection Settings Settings pe Websites kI e eo ILE Anyone is always allowed to open Trusted websites Nobody may open Blocked You can use this exception list to specify websites pci that should either always or never be blocked from Internet amp Email Controls fe Add S Remove op enin g E
14. nes so consider using this protection only when receiving files or installing programs that seem risky 20 Protection settings Protection Settings bi ESE konte Block potentially dangerous websites Internet amp Email Controls Protection strength High Choose Normal for regular daily use without Web Threats aggressively blocking minor risks Normal Network Low Instant Messaging se Display the Trend Micro Toolbar on supported web browsers Anti spam Prevent Microsoft Internet Explorer from running malicious scripts on Exception Lists infected websites Other Settings I Erps eTe PAETI Trend Micro maintains a database of risky websites that have a history of transmitting malicious software or supporting online fraud Follow the directions below to protect yourself from unsafe sites Ea Mark the Block potentially dangerous websites checkbox to protect against threats on the Internet automatically Choose one of the three levels of protection against Web threats High Prevents you from opening sites that pose even a slight risk of transmitting viruses and spyware This setting also blocks harmless sites that might have been hijacked in the past Normal Blocks websites that have characteristics associated with online fraud or that show signs of transmitting viruses and spyware This setting also blocks unrated sites that might pose a threat Low Only blocks websites verified as da
15. ngerous These sites can transmit viruses and spyware or actively support online fraud Ea Mark the Display the Trend Micro Toolbar on supported web browsers checkbox to make the Trend Micro Toolbar start checking for security risks in websites that you might want to open The toolbar can also automatically rate the safety of links listed in online search results ka Mark the Prevent Microsoft Internet Explorer from running malicious scripts on infected websites checkbox to block dangerous software injected by hackers into legitimate websites settings SUIT ca JAR 185 ea SOGY 21 Protection To help keep yourself safe on the Internet at home or on the go you should mark both of these checkboxes Protection Settings Bre id ireaien your secunt Virus amp Spyware Controls Activate the Firewall Booster to enhance the protection given by the Windows Firewall Internet amp Email Controls iw Mark the Activate the Firewall Booster to Display a warning when connected to potentially unsafe wireless networks Web Threats Be enhance the protection given by the Windows Firewall checkbox to configure the Windows Network Firewall so that it can offer better protection against online threats Instant Messaging bu a IM Mark the Display a warning when connected Ekcaptetin Lisi to potentially unsafe wireless networks or hotspots checkbox to see a warning if you connect Other Settings to a wireles
16. nsitive password in the Password field 6 Retype the same case sensitive password in the Confirm password field Password 33 Protection settings Password required for access to Password Protected Features Parental Controls Trend Micro Vault Parental Controls Data Thief Prevention Trend Micro Vault Data Theft Prevention
17. ntrol settings SPATE A An ko AA WWW LERWA ENS WAN AM WE ee W EISIWW AT JWA IZIN What benefits does System Tuner provide System Tuner can offer the following System Tuner will improve your computer s performance and help protect your privacy based enhancemenis lo your computer on your selections below Click Perform Tune up to begin e Disk space System Tuner checks for recoverable disk space in temporary folders the Recycle Bin and other locations You can use the Space recovered to store more programs and files e Startup programs Most computers have several programs and services that start automatically when Windows opens Many of 2 System registry these programs and services including security Privacy software must remain in memory for your benefit However computers with limited memory that run too many programs can slow down or become unresponsive System Tuner can automatically find Performance Set Schedule vv Disk space Startup programs 7 Internet privacy Software histories Instant messagina privacy and delete autostart settings pointing at missing l files to help prevent startup problems If you thoroughly understand how Windows works you erform Tune up Cancel can also choose to remove other autostart settings e System registry The system registry contains all of your Windows and program settings Unused broken or invalid entries clutterin
18. s Trend Micro automatically correlates and analyzes information about threats found on millions of computers to help better protect you No personal new threats more quickly The more people Exception Lists E ki a participate the more effective this network becomes A Note No personal information is gathered or System Startup shi ared A ea IM Mark the Share threat information with Trend Micro checkbox to help Trend Micro Smart Protection Network better protects you Password Cancel 32 Protection settings Protection Settings pe AAE A password protects access to your security Protection Settings n software and safeguards some of its features Once you set a password anyone who wants to shut down or uninstall the security software must past Betas Enable password protection to prevent unauthorized changes Internet amp Email Controls You will need to enter this password before changing program settings or provide the correct password using certain features Enable your password Exception Lists ee ae 1 On the main console click the Settings NE ae 2 Under Other Settings click Password Lhange password l ee 3 Mark the Enable password protection to System Startup Change email address prevent authorized changes checkbox Proxy Settings to set a password 4 Provide an email address where you want Smart Protection Network the password sent if you forget it 5 Type your case se
19. s network without trustworthy security credentials Only password protected wireless networks are a considered safe Wireless networks that redirect your connection without encryption are considered risky Wireless networks that do not have an authentication process or a valid security certificate rank as dangerous 22 Protection settings Protection Settinc 2 Ew Your security software can protect you from links to Protection Settings Aaaa pe unsafe websites sent via popular instant messaging programs STE n se Check for security risks in links to websites received via instant messaging programs Internet amp Email Controls Ga oo r Mark the Check for security risks in links to Windows Live oftware Not Installed a so Web Threats websites received via instant messaging Yahoo Messenger n a programs checkbox and then enable the Network AIM AOL Software Not Installed protection for the instant messaging programs that Instant Messaging Skype Software Not Installed you use Anti spam Exception Lists Other Settings 23 Protection settings Protection Settings Protection Settings Virus amp Spyware Controls Internet amp Email Controls Web Threats Network Instant Messaging Anti spam Exception Lists Other Settings Filter out unsolicited advertisements and other unwanted email messages 24 Protection settings Protection Settings Virus amp Spyware Contro
20. take advantage of this feature by right clicking any file and selecting the Delete with Secure Erase option Data Theft Prevention e Prevents theft of credit card numbers passwords email addresses and other sensitive data from hackers and spyware 15 Data Theft Prevention settings Data Theft Prevention aol Stop protected data from going into web pages email messages or instant messaging Use the pre defined categories below or add new ones of your own Putting just part of a word or number on the list below can still protect the whole thing For example entering just the last four digits of your credit card can block spyware from getting the entire number fe New Category Category What to Protect Email address Phone number El el Credit card 16 Trend Micro Vault file protection imum Security Trend Micro Vault Introduction The Trend Micro Vault is a password protected Windows folder that can safeguard your sensitive files Anyone sharing your computer cannot see anything inside without entering the correct password first If you report your computer as lost the Trend Micro Vault can automatically seal itself shut by remote control Once sealed your Trend Micro Vault will not open even if someone knows the right password Only when you recover the computer can the seal be broken Some things should always remain confidential and the Trend Micro Vault can keep them that w
21. ve to wait a little bit longer for Microsoft Windows to launch when the computer starts e Choose Extra Performance if you prefer to avoid any delays caused by your security software when your computer starts Most security software drivers will load only after Microsoft Windows has finished launching e f you do not know which option to choose pick Balanced Protection to get the protection you need without sacrificing performance lf your computer connects to the Internet through a proxy server you can specify the proxy server settings on this screen ka Mark the Use a proxy server to access the Internet checkbox and configure the settings e Use Internet Explorer proxy settings If you can successfully open websites with Internet Explorer or do not know your proxy server settings choose this option e Enter the necessary proxy settings lf you know your proxy server settings choose this option and enter the required information e Use an automatic configuration script lf your proxy server uses a script or Proxy Auto Configuration PAC file paste the configuration script location or URL in the field such as http FQDN proxy pac 31 Protection settings Protection Settings eee automatically correlates information about Virus amp Spyware Controls m Share threat information with Trend Micro security risks found on millions of computers worldwide to help develop protection against Internet amp Email Control
22. xception Lists Website hitp antivirus com Programsifolders http microsoft com hitp trend com twi m Websites 0 0 S hitp trendmicro europe com Wireless connection hitp trendmicro co jp hitp trendmicro com cni hito trendmicro com twi Other Settings hitp trendmicro com IDoouw hitp trendsecure com Bi L a Ei El Ei a L Ei hH e Fean es tom 2 Protection settings Add or Edit an Item Add the address URL of a website http Import addresses URLS from your Internet Explorer Favorites Response Trust Block 28 Protection settings Protection Settings Virus amp Spyware Controls You may always connectto any access point AP listed below 4 Remowe Access Point AP Internet Email Controls Exception Lists Programsifolders Websites Wireless connection Other Settings e Click the Add button to open a window for selecting a website to put on the list After typing an address select whether to block or trust that website from the dropdown list next to Response You can click the Remove button after marking the checkbox next to at least one thing on the list Wireless connection Any wireless network identified as risky or dangerous that you have decided to trust will appear on this exception list If you change your mind about trusting one of the networks just mark the checkbox next
Download Pdf Manuals
Related Search
Related Contents
【ジョリ】 シリーズ共通取扱説明書 (PDF:3.61MB) Alesis PROACTIVE 5.1 User's Manual Samsung Telephone SVMI-16E User's Manual T'nB UCPOPW2 TINT Condensate Pumps Pompes de recueration des eaux LE FAIT AUTONYMIQUE : LANGAGE, LANGUE, DISCOURS ETC User Manual Copyright © All rights reserved.
Failed to retrieve file