Agent Post-installation

  1. If this is the first time you install the Security Agent on an endpoint running macOS™ 10.14 or later, the system displays the setup wizard that prompts you to allow the required permissions for the Security Agent to function. Follow the on-screen instruction to complete the settings.

    The following describes the complete procedure. The setup wizard automatically skips the permission settings that are not required for your macOS™ version.

    1. Click Open Security & Privacy or access the Apple menu and go to System Preferences > Security & Privacy > General.
    2. Click the lock icon in the bottom left corner and provide your macOS administrator password to make changes.
    3. Click Allow to install the Trend Micro certificate.
    4. Click Continue.
    5. On the Security & Privacy screen, click Allow.
    6. Select all Trend Micro Inc. options and click OK.
    7. Click Allow to allow the Security Agent to filter network content.
    8. Click Continue.
    9. On the Security & Privacy screen, select Full Disk Access from the list of services.
    10. Click Open File Location and locate the iCoreService file; then, drag and drop the file into the Full Disk Access table.
    11. Click Open File Location and drag and drop Apex One (Mac) Security Agent from the Applications folder into the Full Disk Access table.
    12. Make sure the following apps are selected:
      • iCoreService

      • Apex One (Mac) Security Agent

      • Trend Micro Antivirus Extension (if available)

    13. Click Continue.
    14. Restart the computer to make the changes take effect.
  2. The system displays an alert notification prompting you to install and enable the Trend Micro Toolbar for Mac extension. Complete the following steps for your web browser:
    • Safari:

      1. On the alert notification window, click Enable Extension.

        The configuration overview screen appears.

      2. Click Open Safari Extensions.

      3. Select the Trend Micro Toolbar for Mac option to enable the extension.

    • Firefox:

      1. On the alert notification window, click Enable Extension.

        The configuration overview screen appears.

      2. Click Open File Location to locate Trend Micro Toolbar for Mac extension.xpi file; then, drag and drop the file into the Firefox window to install the file.

      3. Click Add to install the Trend Micro Toolbar for Mac extension.

    • (Required for macOS 11.0) Google Chrome:

      1. On the alert notification window, click Enable Extension.

        The configuration overview screen appears.

      2. Click Open File Location to locate and double-click Trend Micro Toolbar For Mac (Chrome).mobileconfig file.

      3. Click Open Profiles.

      4. On the Profiles screen, select Trend Micro Toolbar for Mac (Chrome) and click Install ....

      5. Click Install.

      6. When prompted, type the macOS administrator password and click OK.

      7. Restart Google Chrome to make the changes take effect.

  3. Verify the following:
    • The Security Agent icon () displays on the menu bar of the endpoint.

    • The Security Agent files are found under the <Agent installation folder>.

    • The Security Agent appears on the web console’s agent tree. To access the agent tree, click Agent Management on the main menu.

  4. Update Apex One (Mac) components by clicking Update on the Security Agent console. The agent downloads components from the Apex One (Mac) server. For more information, see Agent Updates.

    If the Security Agent cannot connect to the Apex One (Mac) server, it downloads directly from the Trend Micro ActiveUpdate server. Internet connection is required to connect to the Apex One (Mac) and ActiveUpdate servers.

  5. To start a manual scan on the endpoint, click Scan and choose one of the following scan options:
    • Quick Scan: Scans areas of the endpoint typically targeted by security risks. The pattern files on the Security Agent contain information on the endpoint areas to scan.

    • Custom Scan: Scans the files or folders of your choice. Run custom scan on files or folders that you suspect to be infected.

    • Full Scan: Scans all files, except encrypted and password-protected files.

If there are problems with the Security Agent after installation, try uninstalling and then reinstalling the Security Agent.