Specifications

Trend Micro™ OfficeScan™ 10 Administrator’s Guide
ii
Section 1: Protecting Networked Computers
Chapter 3: Installing the OfficeScan Client
Installation Requirements ..............................................................................3-2
Installation Methods .....................................................................................3-11
Installing from the Web Install Page .....................................................3-13
Initiating Browser-based Installation ................................................3-15
Installing with Login Script Setup ..........................................................3-15
Installing with Client Packager ...............................................................3-18
Client Packager Settings .....................................................................3-20
Deploying an MSI Package Using Active Directory ......................3-23
Deploying an MSI Package Using Microsoft SMS .........................3-24
Installing from the OfficeScan Web Console ......................................3-27
Installing from a Client Disk Image ......................................................3-29
Using Vulnerability Scanner ....................................................................3-30
Installing the OfficeScan Client ........................................................3-34
Managing General Settings ................................................................3-36
Running Vulnerability Scan ................................................................3-40
Creating a Scheduled Task .................................................................3-42
Configuring Other Vulnerability Scanner Settings .........................3-43
Migrating to the OfficeScan Client .............................................................3-44
Migrating from Other Endpoint Security Software ............................3-44
Migrating from ServerProtect Normal Servers ....................................3-45
Post-installation .............................................................................................3-48
Recommended Post-installation Tasks .................................................3-49
Uninstalling the Client ..................................................................................3-50
Uninstalling the Client from the Web Console ...................................3-50
Running the Client Uninstallation Program .........................................3-51
Manually Uninstalling the Client ............................................................3-52