Views:

Procedure

  1. If this is the first time you install the Security Agent on an endpoint running a supported macOS™ version, the system displays the setup wizard that prompts you to allow the required permissions for the Security Agent to function. Follow the on-screen instruction to complete the settings.
    The following describes the complete procedure. The setup wizard automatically skips the permission settings that are not required for your macOS™ version.
    For macOS 13 and above:
    1. Click Open Privacy & Security or access the Apple menu and go to System SettingsPrivacy & Security.
    2. Scroll to the Security section and click Details.
    3. Provide your macOS administrator password and click Unlock or Modify Settings to make changes.
    4. Click the toggle switch to turn on all iCore Service entries and click OK.
    5. Click Allow to allow the Security Agent to filter network content.
    6. Click Continue.
    7. Click Open Full Disk Access or access the Apple menu and go to System SettingsPrivacy & SecurityFull Disk Access.
    8. Click Open File Location and locate the com.trendmicro.icore.es.systemextension file; then, drag and drop the file into the Full Disk Access table.
    9. Click Open File Location and drag and drop Apex One (Mac) Security Agent from the Applications folder into the Full Disk Access table, click Later on the screen that appears.
    10. Click Open File Location and locate the iCore Service file; then, drag and drop the file into the Full Disk Access table.
    11. Click the toggle switch to turn on the following apps:
      • iCore Service
      • Apex One (Mac) Security Agent
      • Trend Micro Extension (if available)
    12. Click Continue.
    13. Restart the computer to make the changes take effect.
    For macOS 10.14, 10.15, 11, and 12:
    1. Click Open Security & Privacy or access the Apple menu and go to System PreferencesSecurity & PrivacyGeneral.
    2. Click the lock icon in the bottom left corner and provide your macOS administrator password to make changes.
    3. Click Allow to install the Trend Micro certificate.
    4. Click Continue.
    5. On the Security & Privacy screen, click Allow.
    6. Select all Trend Micro Inc. options and click OK.
    7. Click Allow to allow the Security Agent to filter network content.
    8. Click Continue.
    9. On the Security & Privacy screen, select Full Disk Access from the list of services.
    10. Click Open File Location and locate the iCore Service file; then, drag and drop the file into the Full Disk Access table.
    11. Click Open File Location and drag and drop Apex One (Mac) Security Agent from the Applications folder into the Full Disk Access table.
    12. Make sure the following apps are selected:
      • iCore Service
      • Apex One (Mac) Security Agent
      • Trend Micro Extension (if available)
    13. Click Continue.
    14. Restart the computer to make the changes take effect.
  2. The system displays an alert notification prompting you to install and enable the Trend Micro Toolbar for Mac extension. Complete the following steps for your web browser:
    • Safari 17 and above:
      1. On the alert notification window, click Enable Extension.
        The configuration overview screen appears.
      2. Click Open Safari Extensions.
      3. Select the Trend Micro Toolbar for Mac option to enable the extension.
      4. In the Permissions section, click Always Allow on Every Website….
      5. When asked whether to allow the extension on every website, click Always Allow on Every Website.
    • Safari 16 and lower:
      1. On the alert notification window, click Enable Extension.
        The configuration overview screen appears.
      2. Click Open Safari Extensions.
      3. Select the Trend Micro Toolbar for Mac option to enable the extension.
    • Firefox:
      1. On the alert notification window, click Enable Extension.
        The configuration overview screen appears.
      2. Click Open File Location to locate Trend Micro Toolbar for Mac extension.xpi file; then, drag and drop the file into the Firefox window to install the file.
      3. Click Add to install the Trend Micro Toolbar for Mac extension.
    • (Required for macOS 11.0 and above) Google Chrome:
      1. On the alert notification window, click Enable Extension.
        The configuration overview screen appears.
      2. Click Open File Location to locate and double-click Trend Micro Toolbar For Mac (Chrome).mobileconfig file.
      3. Click Open Profiles.
      4. On the Profiles screen, select Trend Micro Toolbar for Mac (Chrome) and click Install ....
      5. Click Install.
      6. When prompted, type the macOS administrator password and click OK.
      7. Restart Google Chrome to make the changes take effect.
  3. Verify the following:
    • The Security Agent icon (agent-icon-tball.png) displays on the menu bar of the endpoint.
    • The Apex One (Mac) Security Agent files are found under the <Agent installation folder>.
    • The Security Agent appears on the web console’s agent tree. To access the agent tree, click Agent Management on the main menu.
  4. Update Apex One (Mac) components by clicking Update on the agent console. The Security Agent downloads components from the Apex One (Mac) server. See Agent Updates for details.
    agent-console-main.png
    If the Security Agent cannot connect to the server, it downloads directly from the Trend Micro ActiveUpdate server. Internet connection is required to connect to the ActiveUpdate server.
  5. To start a manual scan on the endpoint, click Scan and choose one of the following scan options:
    • Quick Scan: Scans areas of the endpoint typically targeted by security risks. The pattern files on the Security Agent contain information on the endpoint areas to scan.
    • Custom Scan: Scans the files or folders of your choice. Run custom scan on files or folders that you suspect to be infected.
    • Full Scan: Scans all files, except encrypted and password-protected files.

What to do next

If there are problems with the Security Agent after installation, try uninstalling and then reinstalling the Security Agent.