Endpoint Application Control 2.0 > Installation
        • Online Help Center Home

        • Endpoint Application Control 2.0 Online Help
        • Introduction
          • About Endpoint Application Control
          • Features and Benefits
          • New Features
        • Requirements
          • Server Requirements
          • Agent Requirements
        • Considerations
          • IPv6 Considerations
          • Web Server Considerations
          • TLS/SSL Considerations
          • Java Virtual Machine Considerations
          • Password Considerations
        • Licensing
          • License Versions
          • Registration Keys and Activation Codes
        • Installation
          • Installation Overview
          • Upgrading
          • Server Installation
            • About the Smart Protection Suite Installation Option
            • Starting Setup
            • Welcome Screen
            • License Agreement Screen
            • Proxy Server Screen
            • Product Activation Screen
            • Web Server Screen
            • Root Account Screen
            • Destination Folder Screen
            • Status Screen
            • Installation Complete Screen
          • Agent Deployment
            • Agent Deployment Preparation
            • Downloading Agent Setup EXE
            • Extracting Agent Setup MSI
            • Installing Agents Using the OfficeScan Plug-In
            • Installing Agents Using Windows
            • Installing Agents Using the Command Prompt
            • Installing Agents Using a Logon Script
            • Installing Agents Using Active Directory
            • Installing Agents Using Deployment Tools
            • Agent Installation Command Prompt Parameters
        • Uninstallation
          • Server Uninstallation
            • About Server Uninstallation
            • Uninstalling and Reinstalling
          • Agent Uninstallation
            • About Agent Uninstallation
            • About Orphaned Agents
        • Getting Started
          • Web Console Basics
            • Web Console Screens and Tasks
            • Managing Favorites
            • Dashboard Screen
              • Managing Widgets
              • Managing Tabs
            • About Dynamic Search
            • Configuring Columns
          • About Logs and Log Types
          • About Endpoint Inventories
          • Backing Up and Restoring
            • Backing up your Server
            • Backing up Agents
            • Restoring your Server and Agents
        • Configuration
          • Integration with Trend Micro Products and Services
            • About Trend Micro Control Manager
              • Control Manager Integration
              • Supported Control Manager Versions
              • Registering with Control Manager
              • Adding a Directory for the Endpoint Application Control Entity in Control Manager
              • Checking Server Status in Control Manager
              • Single Sign-On with Control Manager
              • Control Manager and Rule Synchronization
              • Querying Logs with Control Manager
          • Log Maintenance Screen
          • Updates Screen
          • Proxy Settings Screen
          • Server Settings Screen
          • Web Console Accounts Screen
            • About Web Console Accounts Columns
            • About Account Roles
          • License Information Screen
        • Monitoring
          • Using Widgets
            • Choosing Widgets
            • Server Summary Widget
            • Key Performance Indicator Widget
            • Application, Rule, and Policy Events Widget
            • User and Endpoint Summary Widget
          • Users and Endpoints Screen
            • About User and Endpoint Columns
          • Query Logs Screen
            • About Log Query Columns
            • About Event Log Tags
            • About Log Types and Histograms
        • Rules and Policies
          • About Rules and Policies
            • About Policies
            • About Rule Types
            • About Lockdown Allow Conditions
            • About Policy Deployment
            • About Rule Priority
            • About Blocking Methods
              • About Kernel-Level Blocking
              • About User-Level Blocking
              • Configuring Blocking Methods
            • About Trusted Sources
          • Rules Screen
            • About Rules Columns
            • Add or Edit Rule Screen
              • Match Using Known Application Dynamic Search
              • Match Using Certified Safe Software List
              • Match Using File Paths
              • Match Using Certificates
              • Match Using SHA-1 Hash Values
          • Policies Screen
            • About Policies Columns
            • Add or Edit Policy Screen
              • Policy Rules
              • Policy Logging
              • Policy Server Connection
              • Policy Deployment
              • Policy User Experience
        • Known Issues
        • Technical Support
          • Troubleshooting Resources
          • Contacting Trend Micro
          • Sending Suspicious Content to Trend Micro
          • Other Resources

        Installation

        • Installation Overview
        • Upgrading
        • Server Installation
        • Agent Deployment