Installing from Windows Parent topic

To install Trend Micro Safe Lock, you must log on using an account with administrator privileges.

Procedure

  1. Double-click SL_Install.exe.
    If a User Account Control warning from Windows appears, click Yes.
    install_00.png
    install_01.png
  2. When the installation wizard opens, click Next.
    Note
    Note
    If there is another version of Safe Lock on the endpoint, the installer will remove it before installing the latest version.
  3. Read the license agreement, select I accept the terms in the License Agreement, and click Next.
    install_02.png
  4. Make any necessary changes to the installation options, and click Next.
    Important
    Important
    Network Virus Protection can only be installed during the initial program installation, but it can be disabled after installation, if necessary. See Exploit Prevention Settings in the Administrator's Guide for more information.
    install_03.jpg
  5. Provide the Activation Code and specify an administrator password for Trend Micro Safe Lock.
    Note
    Note
    The password must be 8 to 64 alphanumeric characters. The following characters are not supported: | > < \ " spaces. The Safe Lock administrator password is unrelated to the Windows administrator password.
    install_04.png
    WARNING
    WARNING
    Do not forget the Safe Lock administrator password. The only way to recover after losing the Safe Lock administrator password is by reinstalling the operating system.
  6. Click Next.
    A message appears asking if you would like to scan the endpoint for threats before continuing with the installation.
    install_prescan_01.png
  7. Optionally, scan the endpoint for threats before continuing with the installation. Trend Micro recommends you perform this scan.
    • To scan the endpoint for threats, click Scan.
      1. The Endpoint Prescan window appears.
      2. To customize the scan settings, click Edit Scan Settings.
      3. Click Scan Now.
        If Endpoint Prescan detects security risks, Trend Micro recommends canceling the installation. Remove threats from the endpoint and try again. If critical programs are detected as threats, confirm that the endpoint is secure and that the versions of the programs installed do not contain threats. Ignore detected threats only if you are absolutely certain that they are false positives.
        Tip
        Tip
        Trend Micro provides solutions for detecting and removing threats. For endpoints with limited or no network access, Trend Micro recommends using Trend Micro Portable Security. See Trend Micro Portable Security Compatible. For more information about this and other solutions from Trend Micro, go to http://trendmicro.com/.
    • To skip scanning, click Do Not Scan.
  8. When the Installation Complete window displays, click Finish.
    install_05.jpg
    Note
    Note
    Optionally enable memory randomization on older operating systems such as Windows XP or Windows Server 2003, which may lack or offer limited Address Space Layout Randomization (ASLR) support. See Exploit Prevention Settings in the Administrator's Guide for more information.