You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Privacy and Personal Data Collection Disclosure
Home
What's New in Release 9.8 SP5 Critical Patch 6
What's New in Release 9.8 SP5 Critical Patch 5
What's New in Release 9.8 SP5 Critical Patch 4
What's New in Release 9.8 SP5 Critical Patch 3
What's New in Release 9.8 SP5 Critical Patch 2
What's New in Release 9.8 SP5 Critical Patch 1
What's New in Release 9.8 SP5
What's New in Release 9.8 SP4
What's New in Release 9.8 SP3
What's New in Release 9.8 SP2 Patch 1
What's New in Release 9.8 SP2
What's New in Release 9.8 SP1
What's New in Release 9.8
What's New in Release 9.7 Patch 3
What's New in Release 9.7 Patch 2
What's New in Release 9.7
What's New in Release 9.6 SP1
What's New in Release 9.6
Mobile Security Documentation
Document Conventions
About...
Mobile Security for Enterprise
Components of Mobile Security System
Comparison Between Local and Cloud Communication Servers
Main Mobile Device Agent Features
Supported Mobile Device OS Features
Product License
Activation Code
Machine Learning in Trend Micro Mobile Security
Security Risks
Mobile Threats
Malware
Getting Started
Administration Web Console
Accessing the Administration Web Console
Turning Off Compatibility Mode in Internet Explorer
Registering the Product
Installing Local Communication Server
Initial Server Setup
Verifying Mobile Security Configuration
Dashboard Information
Adding a New Tab
Removing a Tab
Adding Widgets
Removing Widgets
Changing Widget's Position
Refreshing the Information on the Widgets
Viewing or Modifying Tab Settings
Viewing Users
Users Tab
Viewing the Users List
Handling Mobile Device Agent
Supported Mobile Devices and Platforms
Device Storage and Memory
Setting Up Mobile Device Agent
Installing MDA on Mobile Devices
iOS Mobile Devices
Installation Method I
Android Mobile Devices
Installation Method I
Installation Method II
Enrolling MDA to the Mobile Security Management Server
Android Mobile Devices
Enrolling Using QR Code
Enrolling Using Server Address
Enrolling Without Using Server Address
iOS Mobile Devices
Enrolling Using QR Code
Enrolling Using Server Address
Enrolling Without Using Server Address
Groups in Mobile Security
Adding a Group
Renaming a Group
Deleting a Group
Mobile Device Status
Basic Mobile Device Agent Search
Advanced Mobile Device Agent Search
Device Tree View Options
Mobile Device Agent Tasks
Editing Mobile Device Information
Deleting Single Mobile Device
Deleting Multiple Mobile Devices
Moving Mobile Devices to Another Group
Updating Mobile Device Agents
Lost Device Protection
Locating a Remote Mobile Device
Locking a Remote Mobile Device
Wiping a Remote Mobile Device
Resetting Password Remotely
Resetting Password for an Android Mobile Device
Removing the Password for an iOS Mobile Device
Exporting Data
Sending Messages to Mobile Devices
Integration with Trend Micro Control Manager
Creating Security Policies in Control Manager
Deleting or Modifying Security Policies
Security Policy Statuses on Control Manager
Protecting Devices with Policies
Policies for All Devices
Application Approved List
Trusted Network Traffic Decryption Certificate List
Managing Policies for All Devices
Adding Applications to Approved List
Removing Applications from Approved List
Adding a Trusted Network Traffic Decryption Certificate
Deleting a Trusted Network Traffic Decryption Certificate
Policies for All Groups
Common Policy
Security Policy
Managing Policies for All Groups
Creating a Policy
Editing a Policy
Assigning or Removing Policy from a Group
Copying a Policy
Deleting Policies
Viewing Installed Apps
About Applications
Viewing Installed Applications
Viewing and Managing Detections
About Suspicious Applications Screen
Viewing Suspicious Android Applications
Viewing Suspicious iOS Applications
Viewing Malicious SSL Certificates
Viewing Malicious iOS Profiles
Updating Mobile Security Components
Manual Update
Scheduled Update
Specifying a Download Source
Manually Updating a local AU server
Viewing and Maintaining Logs
Viewing Mobile Device Agent Logs
Log Maintenance
Scheduling Log Deleting
Deleting Logs Manually
Using Notifications and Reports
About Notification Messages and Reports
Configuring Notification Settings
Configuring Email Notifications
Administrator Notifications
Enabling Administrator Notifications
Configuring Administrator Notification Settings
Reports
Generating Reports
Viewing Reports
Sending Reports
Scheduling Reports
Modifying the Email Template
User Notifications
Configuring User Notifications
Configuring Installation Message
Configuration Tasks
Managing Administrator Accounts
Default Administrator Account Name and Role
Adding Administrator Accounts
Editing an Administrator Account
Deleting an Administrator Account
Creating an Administrator Role
Editing an Administrator Role
Deleting an Administrator Role
Changing Administrator Password
Configuring Device Enrollment Settings
Customizing Mobile Security Terms of Use
Managing Certificates
Uploading a Certificate
Deleting a Certificate
Command Queue Management
Configuring Schedule for Deleting Old Commands
Deleting Old Commands Manually
Configuring Database Settings
Configuring Communication Server Settings
Configuring Common Communication Server Settings
Configuring Android Communication Server Settings
Configuring iOS Communication Server Settings
Configuring Deployment Settings
Switching from Full Version to Security Scan Deployment Mode
Configuring AirWatch Integration with Trend Micro Mobile Security
Configuring MobileIron Integration with Trend Micro Mobile Security
Configuring Citrix XenMobile Integration with Trend Micro Mobile Security
Configuring IBM MaaS360 Integration with Trend Micro Mobile Security
Configuring BlackBerry UEM Integration with Trend Micro Mobile Security
Configuring Active Directory (AD) Settings
Configuring Management Server Settings
Verifying Mobile Security Configuration
Integrating with Other MDM Solutions
Feature Integration Comparison for MDM Solutions
Integration with AirWatch
Prerequisites for Integration
AirWatch Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Automatic Grouping for Mobile Applications
Configuring AirWatch Blacklist Compliance Policy for Apps
Configuring AirWatch Integration
AirWatch Account Permission Requirements for Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Configuring Automatic Launch for Android Mobile Devices
Deploying iOS Agent
Integration with MobileIron
Prerequisites for Integration
MobileIron Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Configuring MobileIron Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with Citrix XenMobile
Prerequisites for Integration
Citrix XenMobile Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Automatic Status Update for Mobile Applications
Configuring Citrix XenMobile Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with IBM MaaS360
Prerequisites for Integration
IBM MaaS360 Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Configuring IBM MaaS360 Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with BlackBerry UEM
Prerequisites for Integration
BlackBerry UEM Integration Architecture
Integration Features
Configuring BlackBerry UEM Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Network Ports Configuration
Network Ports Configuration for Enhanced Security Model with Cloud Communication Server
Network Ports Configuration for Enhanced Security Model with Local Communication Server
Network Ports Configuration for Basic Security Model
Optional Configuration
Using Windows Authentication for SQL Server
Configuring Communication Server Ports
Configuring Local Communication Server High Availability
Example for Local Communication Server High Availability Configuring
Troubleshooting
Getting Help
Before Contacting Technical Support
Contacting Technical Support
Sending Suspicious Content to Trend Micro
File Reputation Services
TrendLabs
About Software Updates
Known Issues
Other Useful Resources
Documentation Feedback
About Trend Micro
About...
This section introduces
Mobile Security
and its components and the security risks to mobile devices.
Related information
Mobile Security for Enterprise
Machine Learning in Trend Micro Mobile Security
Security Risks
Table of Contents
Privacy and Personal Data Collection Disclosure
Home
What's New in Release 9.8 SP5 Critical Patch 6
What's New in Release 9.8 SP5 Critical Patch 5
What's New in Release 9.8 SP5 Critical Patch 4
What's New in Release 9.8 SP5 Critical Patch 3
What's New in Release 9.8 SP5 Critical Patch 2
What's New in Release 9.8 SP5 Critical Patch 1
What's New in Release 9.8 SP5
What's New in Release 9.8 SP4
What's New in Release 9.8 SP3
What's New in Release 9.8 SP2 Patch 1
What's New in Release 9.8 SP2
What's New in Release 9.8 SP1
What's New in Release 9.8
What's New in Release 9.7 Patch 3
What's New in Release 9.7 Patch 2
What's New in Release 9.7
What's New in Release 9.6 SP1
What's New in Release 9.6
Mobile Security Documentation
Document Conventions
About...
Mobile Security for Enterprise
Components of Mobile Security System
Comparison Between Local and Cloud Communication Servers
Main Mobile Device Agent Features
Supported Mobile Device OS Features
Product License
Activation Code
Machine Learning in Trend Micro Mobile Security
Security Risks
Mobile Threats
Malware
Getting Started
Administration Web Console
Accessing the Administration Web Console
Turning Off Compatibility Mode in Internet Explorer
Registering the Product
Installing Local Communication Server
Initial Server Setup
Verifying Mobile Security Configuration
Dashboard Information
Adding a New Tab
Removing a Tab
Adding Widgets
Removing Widgets
Changing Widget's Position
Refreshing the Information on the Widgets
Viewing or Modifying Tab Settings
Viewing Users
Users Tab
Viewing the Users List
Handling Mobile Device Agent
Supported Mobile Devices and Platforms
Device Storage and Memory
Setting Up Mobile Device Agent
Installing MDA on Mobile Devices
iOS Mobile Devices
Installation Method I
Android Mobile Devices
Installation Method I
Installation Method II
Enrolling MDA to the Mobile Security Management Server
Android Mobile Devices
Enrolling Using QR Code
Enrolling Using Server Address
Enrolling Without Using Server Address
iOS Mobile Devices
Enrolling Using QR Code
Enrolling Using Server Address
Enrolling Without Using Server Address
Groups in Mobile Security
Adding a Group
Renaming a Group
Deleting a Group
Mobile Device Status
Basic Mobile Device Agent Search
Advanced Mobile Device Agent Search
Device Tree View Options
Mobile Device Agent Tasks
Editing Mobile Device Information
Deleting Single Mobile Device
Deleting Multiple Mobile Devices
Moving Mobile Devices to Another Group
Updating Mobile Device Agents
Lost Device Protection
Locating a Remote Mobile Device
Locking a Remote Mobile Device
Wiping a Remote Mobile Device
Resetting Password Remotely
Resetting Password for an Android Mobile Device
Removing the Password for an iOS Mobile Device
Exporting Data
Sending Messages to Mobile Devices
Integration with Trend Micro Control Manager
Creating Security Policies in Control Manager
Deleting or Modifying Security Policies
Security Policy Statuses on Control Manager
Protecting Devices with Policies
Policies for All Devices
Application Approved List
Trusted Network Traffic Decryption Certificate List
Managing Policies for All Devices
Adding Applications to Approved List
Removing Applications from Approved List
Adding a Trusted Network Traffic Decryption Certificate
Deleting a Trusted Network Traffic Decryption Certificate
Policies for All Groups
Common Policy
Security Policy
Managing Policies for All Groups
Creating a Policy
Editing a Policy
Assigning or Removing Policy from a Group
Copying a Policy
Deleting Policies
Viewing Installed Apps
About Applications
Viewing Installed Applications
Viewing and Managing Detections
About Suspicious Applications Screen
Viewing Suspicious Android Applications
Viewing Suspicious iOS Applications
Viewing Malicious SSL Certificates
Viewing Malicious iOS Profiles
Updating Mobile Security Components
Manual Update
Scheduled Update
Specifying a Download Source
Manually Updating a local AU server
Viewing and Maintaining Logs
Viewing Mobile Device Agent Logs
Log Maintenance
Scheduling Log Deleting
Deleting Logs Manually
Using Notifications and Reports
About Notification Messages and Reports
Configuring Notification Settings
Configuring Email Notifications
Administrator Notifications
Enabling Administrator Notifications
Configuring Administrator Notification Settings
Reports
Generating Reports
Viewing Reports
Sending Reports
Scheduling Reports
Modifying the Email Template
User Notifications
Configuring User Notifications
Configuring Installation Message
Configuration Tasks
Managing Administrator Accounts
Default Administrator Account Name and Role
Adding Administrator Accounts
Editing an Administrator Account
Deleting an Administrator Account
Creating an Administrator Role
Editing an Administrator Role
Deleting an Administrator Role
Changing Administrator Password
Configuring Device Enrollment Settings
Customizing Mobile Security Terms of Use
Managing Certificates
Uploading a Certificate
Deleting a Certificate
Command Queue Management
Configuring Schedule for Deleting Old Commands
Deleting Old Commands Manually
Configuring Database Settings
Configuring Communication Server Settings
Configuring Common Communication Server Settings
Configuring Android Communication Server Settings
Configuring iOS Communication Server Settings
Configuring Deployment Settings
Switching from Full Version to Security Scan Deployment Mode
Configuring AirWatch Integration with Trend Micro Mobile Security
Configuring MobileIron Integration with Trend Micro Mobile Security
Configuring Citrix XenMobile Integration with Trend Micro Mobile Security
Configuring IBM MaaS360 Integration with Trend Micro Mobile Security
Configuring BlackBerry UEM Integration with Trend Micro Mobile Security
Configuring Active Directory (AD) Settings
Configuring Management Server Settings
Verifying Mobile Security Configuration
Integrating with Other MDM Solutions
Feature Integration Comparison for MDM Solutions
Integration with AirWatch
Prerequisites for Integration
AirWatch Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Automatic Grouping for Mobile Applications
Configuring AirWatch Blacklist Compliance Policy for Apps
Configuring AirWatch Integration
AirWatch Account Permission Requirements for Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Configuring Automatic Launch for Android Mobile Devices
Deploying iOS Agent
Integration with MobileIron
Prerequisites for Integration
MobileIron Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Configuring MobileIron Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with Citrix XenMobile
Prerequisites for Integration
Citrix XenMobile Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Automatic Status Update for Mobile Applications
Configuring Citrix XenMobile Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with IBM MaaS360
Prerequisites for Integration
IBM MaaS360 Integration Architecture
Integration Features
Automatic Grouping for Mobile Devices
Configuring IBM MaaS360 Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Integration with BlackBerry UEM
Prerequisites for Integration
BlackBerry UEM Integration Architecture
Integration Features
Configuring BlackBerry UEM Integration
Agent Deployment
Deploying Android Agent Through Google Play Store
Deploying Android Agent Through Mobile Security Server
Deploying iOS Agent
Network Ports Configuration
Network Ports Configuration for Enhanced Security Model with Cloud Communication Server
Network Ports Configuration for Enhanced Security Model with Local Communication Server
Network Ports Configuration for Basic Security Model
Optional Configuration
Using Windows Authentication for SQL Server
Configuring Communication Server Ports
Configuring Local Communication Server High Availability
Example for Local Communication Server High Availability Configuring
Troubleshooting
Getting Help
Before Contacting Technical Support
Contacting Technical Support
Sending Suspicious Content to Trend Micro
File Reputation Services
TrendLabs
About Software Updates
Known Issues
Other Useful Resources
Documentation Feedback
About Trend Micro