Trend Micro Apex One (Mac) Patch 4 Server Online Help > Getting Help > Technical Support
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
        • Preface
          • Apex One (Mac) Documentation
          • Audience
          • Document Conventions
          • Terminology
        • Introducing Apex One (Mac)
          • About Trend Micro Apex One (Mac)
          • New in this Release
          • Key Features and Benefits
          • The Apex One (Mac) Server
          • The Apex One (Mac) Security Agent
        • Installing the Server
          • Server Installation Requirements
          • Update Source
          • Installing the Apex One (Mac) Server
          • Activating the Product for the First Time
          • Performing Post-installation Tasks on the Server
          • Uninstalling the Apex One (Mac) Server
        • Getting Started
          • Getting Started Tasks
          • The Web Console
            • Opening the Web Console
          • Security Summary
          • The Agent Tree
            • Agent Tree General Tasks
            • Agent Tree Specific Tasks
          • Groups
            • Adding a Group
            • Deleting a Group or Security Agent
            • Renaming a Group
            • Moving Security Agents
              • Moving Agents to Another Group
              • Moving Security Agents to Another Server
          • Widgets
            • Agent Connectivity (Mac) Widget
            • Agent Updates (Mac) Widget
            • Security Risk Detections (Mac) Widget
          • Trend Micro Smart Protection
            • Smart Feedback
        • Installing the Security Agent
          • Agent Installation Requirements
          • Agent Installation Methods and Setup Files
            • Installing on a Single Endpoint
          • Agent Post-installation
          • Agent Uninstallation
        • Keeping Protection Up-to-Date
          • Components
          • Update Overview
          • Server Update
            • Configuring the Server Update Source
            • Configuring Proxy Settings for Server Updates
            • Server Update Methods
              • Scheduling Updates for the Server
              • Manually Updating the Server
          • Agent Updates
            • Configuring Agent Automatic Update
            • Configuring Agent Update Settings
            • Launching Agent Update from the Summary Screen
            • Launching Agent Update from the Agent Management Screen
        • Protecting Endpoints from Security Risks
          • About Security Risks
            • Viruses and Malware
            • Spyware and Grayware
          • Scan Method Types
            • Default Scan Method
            • Scan Methods Compared
            • Changing the Scan Method
            • Switching from Smart Scan to Conventional Scan
            • Switching from Conventional Scan to Smart Scan
          • Scan Types
            • Real-time Scan
              • Configuring Real-time Scan Settings
                • Real-time Scan: Target Tab
                • Real-time Scan: Action Tab
            • Manual Scan
              • Configuring Manual Scan Settings
                • Manual Scan: Target Tab
                • Manual Scan: Action Tab
            • Scheduled Scan
              • Configuring Scheduled Scan Settings
                • Scheduled Scan: Target Tab
                • Scheduled Scan: Action Tab
            • Scan Now
              • Initiating Scan Now
          • Supported Compressed File Types
          • Scan Actions
          • Scan Exclusions
            • Configuring Scan Exclusion Lists
          • Cache Settings for Scans
            • Configuring Cache Settings for Scans
          • Trusted Program List
            • Configuring the Trusted Program List
          • Viewing Scan Operation Logs
          • Security Risk Notifications and Logs
            • Configuring Administrator Notification Settings
            • Configuring Security Risk Notifications for Administrators
            • Configuring Outbreak Notifications for Administrators
            • Viewing Security Risk Logs
              • Scan Results
              • Uncleanable Files
            • Resetting Security Risk Count
        • Protecting Endpoints from Web-based Threats
          • Web Threats
          • Web Reputation
          • Configuring Web Reputation Settings
          • Configuring the Approved and Blocked URL Lists
          • Viewing Web Reputation Logs
        • Using Device Control
          • Device Control
          • Permissions for Storage Devices
          • Configuring Device Control Settings
            • Device List Tool
              • Running the Device List Tool
          • Viewing Device Control Logs
        • Managing the Server and Security Agents
          • Privileges and Other Settings
            • Configuring Agent Self-protection
          • Enabling Certified Safe Software Service
          • Enabling Predictive Machine Learning
          • Upgrading the Server and Security Agents
            • Upgrading the Server
            • Upgrading Security Agents
          • Managing Logs
          • Managing Licenses
          • Backing Up the Server Database
          • Restoring the Server Database
          • Apex Central and Control Manager Integration in this Release
            • Key Performance Indicators Widget
              • Configuring Server Connection Settings
              • Configuring Key Performance Indicators
              • Configuring Widget Settings
          • Configuring Agent-Server Communication Settings
          • Inactive Security Agents
            • Automatically Removing Inactive Security Agents
          • Agent Icons
        • Getting Help
          • Troubleshooting
            • Web Console Access
            • Server Uninstallation
            • Agent Installation
            • Agent-Server Communication
            • General Agent Error
          • Technical Support
            • Troubleshooting Resources
              • Using the Support Portal
              • Threat Encyclopedia
            • Contacting Trend Micro
              • Speeding Up the Support Call
            • Sending Suspicious Content to Trend Micro
              • Email Reputation Services
              • File Reputation Services
              • Web Reputation Services
            • Other Resources
              • Download Center
              • Documentation Feedback
        • IPv6 Support in Apex One (Mac)
          • IPv6 Support for Apex One (Mac) Server and Security Agents
          • Apex One (Mac) Security Agent IPv6 Requirements
          • Pure IPv6 Server Limitations
          • Pure IPv6 Agent Limitations
          • Configuring IPv6 Addresses
          • Screens That Display IP Addresses

        Technical Support

        Learn about the following topics:

        • Troubleshooting Resources

        • Contacting Trend Micro

        • Sending Suspicious Content to Trend Micro

        • Other Resources

        • Troubleshooting Resources
        • Contacting Trend Micro
        • Sending Suspicious Content to Trend Micro
        • Other Resources
        Parent topic: Getting Help