Collapse AllExpand All
  • accounts
    • See web console accounts
  • agent configuration file [1] [2]
    • editing [1]
    • exporting or importing [1]
    • syntax [1]
  • agent endpoint preparation
    • Windows 7 [1]
    • Windows 8 [1]
    • Windows 8.1 [1]
    • Windows Server 2003 [1]
    • Windows Server 2003 R2 [1]
    • Windows Server 2008 [1]
    • Windows Server 2008 R2 [1]
    • Windows XP [1]
  • agent events
    • exporting [1]
    • importing [1]
    • log maintenance [1]
    • notifications [1]
    • querying logs [1]
    • tracking [1]
  • agent installer
    • approved list [1] [2]
    • command line interface [1] [2]
    • downloading [1] [2]
    • modified packages [1]
    • overview [1]
    • Setup.ini Agent section [1]
    • Setup.ini arguments [1]
    • Setup.ini EventLog section [1]
    • Setup.ini MessageRandomization section [1]
    • Setup.ini Message section [1]
    • Setup.ini Prescan section [1]
    • Setup.ini Property section [1]
    • Setup.ini Proxy section [1]
    • Setup.ini Server section [1]
    • Setup.ini syntax [1]
    • Setup.ini use [1]
    • upgrade preparation [1]
    • Windows Installer [1]
  • agents [1]
    • account passwords [1]
    • accounts [1] [2]
    • changing lockdown [1]
    • collecting logs [1]
    • collecting status [1]
    • component update locations [1]
    • console [1]
    • displaying details [1]
    • editing tags [1]
    • error codes [1]
    • event ID codes [1]
    • exporting data [1]
    • features and benefits [1]
    • manual component updates [1]
    • operating systems [1]
    • querying [1]
    • remote setup [1]
    • removing from list [1]
    • scheduled component updates [1]
    • settings [1] [2]
    • status icons [1]
    • system requirements [1]
    • uninstallation [1]
    • use overview [1]
  • Application Lockdown [1]
  • Approved List [1]
    • adding or removing files [1]
    • checking or updating hashes [1]
    • configuring [1]
    • exporting or importing [1]
    • hashes [1]
    • installing or updating files [1]
    • setting up [1] [2] [3] [4]
  • configuration file
    • See agent configuration file
  • console
    • feature comparison [1]
  • dashboard [1]
    • adding tabs [1]
    • default tabs [1]
    • tabs [1]
    • tab settings [1]
  • dashboard widgets
    • See widgets
  • default shares [1]
  • documentation [1]
  • error codes
    • See agents, error codes
  • event ID codes
    • See agents, event ID codes
  • events
    • See agent events
    • See server events
  • Exploit Prevention [1]
  • hashes [1]
  • installation
    • customization [1]
    • methods [1]
  • installer
    • See agent installer
  • local accounts
    • enabling administrator [1]
    • enabling default shares [1]
  • Network Virus Protection [1] [2]
  • notifications [1] [2]
  • operating systems
    • See agents, operating systems
    • See server, operating systems
  • passwords
    • See agents, account passwords
  • remote tasks
    • See SLrst Program
    • See SLtasks Program
  • requirements
    • See agents, system requirements
    • See server, system requirements
  • Restricted User account
  • Safe Lock
    • See agents
    • See server
  • Safe Lock Intelligent Manager
    • See server
  • server [1]
    • accounts [1]
    • features and benefits [1]
    • message time groups [1]
    • notifications [1]
    • operating systems [1]
    • remote tasks [1] [2]
    • system requirements [1]
  • server console
    • See web console
  • server events
    • exporting [1]
    • log maintenance [1]
    • querying logs [1]
    • tracking [1]
  • SLCmd Commands
    • For Application Lockdown [1]
    • For Approved List [1]
    • For Central Management [1]
    • For Configuration File [1]
    • For General Actions [1]
    • For Optional Features [1]
    • For Predefined Trusted Updater [1]
    • For Predefined Trusted Updater "Add" [1]
    • For Restricted User Accounts [1]
    • For Scripts [1]
    • For Trusted Certifications [1]
    • For Trusted Hash List [1]
    • For Trusted Updater [1]
    • For Windows Update Support [1]
    • For Write Protection [1]
  • SLCmd Program [1]
    • commands
      • See SLCmd Commands
    • comparison to console functions [1]
    • using [1]
  • SLrst Program [1]
    • agent target files [1] [2] [3]
    • downloading installers [1] [2]
    • remote installation considerations [1]
    • remotely installing agents [1]
    • remotely restarting agents [1]
    • remotely uninstalling agents [1]
  • SLtasks Program [1]
    • message time groups [1]
    • remotely hotfixing agents [1]
    • remotely patching agents [1]
    • sending tasks [1]
  • system requirements
    • See agents, system requirements
    • See server, system requirements
  • tabs
    • See dashboard
  • tab widgets
    • See widgets
  • technical support [1]
  • terminology [1]
  • Trend Micro [1]
  • Trend Micro Portable Security [1]
  • Trusted Updater [1]
  • uninstallation
    • See agents, uninstallation
  • upgrading
    • See agent installer, upgrade preparation
  • web console
    • accounts
      • See web console accounts
    • activation codes [1]
    • agent details [1]
    • changing lockdown [1]
    • collecting logs [1]
    • component updates [1]
    • dashboard
      • See dashboard
    • editing agent tags [1]
    • exporting agent data [1]
    • exporting agent events [1]
    • exporting server events [1]
    • importing agent events [1]
    • license management [1] [2]
    • log maintenance [1]
    • marking events [1]
    • proxy settings [1]
    • querying agent events [1]
    • querying agents [1]
    • querying server events [1]
    • removing agents [1]
    • widgets
      • See widgets
  • web console accounts [1]
  • widgets [1]
    • adding [1]
    • using [1]
    • See also dashboard

Installing from Windows Parent topic

To install Trend Micro Safe Lock, you must log on using an account with administrator privileges.

Procedure

  1. Double-click SL_Install.exe.
    If a User Account Control warning from Windows appears, click Yes.
    install_00.png
    install_01.png
  2. When the installation wizard opens, click Next.
    Note
    Note
    If there is another version of Safe Lock on the endpoint, the installer will remove it before installing the latest version.
  3. Read the license agreement, select I accept the terms in the License Agreement, and click Next.
    install_02.png
  4. Make any necessary changes to the installation options, and click Next.
    Important
    Important
    Network Virus Protection can only be installed during the initial program installation, but it can be disabled after installation, if necessary. See Exploit Prevention Settings in the Administrator's Guide for more information.
    install_03.jpg
  5. Provide the Activation Code and specify an administrator password for Trend Micro Safe Lock.
    Note
    Note
    The password must be 8 to 64 alphanumeric characters. The following characters are not supported: | > < \ " spaces. The Safe Lock administrator password is unrelated to the Windows administrator password.
    install_04.png
    WARNING
    WARNING
    Do not forget the Safe Lock administrator password. The only way to recover after losing the Safe Lock administrator password is by reinstalling the operating system.
  6. Click Next.
    A message appears asking if you would like to scan the endpoint for threats before continuing with the installation.
    install_prescan_01.png
  7. Optionally, scan the endpoint for threats before continuing with the installation. Trend Micro recommends you perform this scan.
    • To scan the endpoint for threats, click Scan.
      1. The Endpoint Prescan window appears.
      2. To customize the scan settings, click Edit Scan Settings.
      3. Click Scan Now.
        If Endpoint Prescan detects security risks, Trend Micro recommends canceling the installation. Remove threats from the endpoint and try again. If critical programs are detected as threats, confirm that the endpoint is secure and that the versions of the programs installed do not contain threats. Ignore detected threats only if you are absolutely certain that they are false positives.
        Tip
        Tip
        Trend Micro provides solutions for detecting and removing threats. For endpoints with limited or no network access, Trend Micro recommends using Trend Micro Portable Security. See Trend Micro Portable Security Compatible. For more information about this and other solutions from Trend Micro, go to http://trendmicro.com/.
    • To skip scanning, click Do Not Scan.
  8. When the Installation Complete window displays, click Finish.
    install_05.jpg
    Note
    Note
    Optionally enable memory randomization on older operating systems such as Windows XP or Windows Server 2003, which may lack or offer limited Address Space Layout Randomization (ASLR) support. See Exploit Prevention Settings in the Administrator's Guide for more information.