Views:
Tip:

How to find this tool:

Main Console > Device > Protect Another Device

Not all versions of Trend Micro security software include this feature.

Your Trend Micro security software can protect multiple devices, including PC, Mac, iOS, and Android devices. The number of devices you can protect will depend on the number of seats you purchased with your license.

Finding devices to protect

You can scan your home network to find connected devices to protect by clicking Scan my network to find connected devices on the welcome page, or directly from the main console by clicking Protect Another Device.

If an unprotected device is found, click the Install button that appears underneath it to share protection to this device.

If no devices are found connected to your network, you can click Add a Device to Protect to share protection with another device via email, link or by downloading a copy of your security software.

Protecting another device

To protect another device, click the Device tab on the main console, then select Protect Another Device. You can also access Protect Another Device by clicking the link on the bottom-left corner of the main console. On the Protected Devices window, click the + icon and select the type of device you would like to protect. You can choose to share protection with other devices in several different ways, as described below.

Table 1.

Sharing Method

Description

Send Email

Send a message containing a link for downloading and installing your Trend Micro security software on another device.

Copy Link

Copy the link provided and paste it into an instant messaging program to send the link to another device for downloading and installing your Trend Micro security software.

Download

Click the Download button to download a copy of your Trend Micro security software and use a USB to transfer the file to the computer you would like to protect.

Scan QR code

Scan the QR code with the mobile device you would like to protect to install your Trend Micro security software on the device.

Follow the instructions of the sharing method you select to install your Trend Micro security software on your device.

Stop protecting a device

To stop protecting a device, click the Device tab on the main console, then select Protect Another Device. On the Protected Devices window, click the X on the device you want to stop protecting to remove protection.