<> Trend Micro, In. December 17, 2014 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) ServerProtect(TM) for EMC(R) Celerra(TM) 5.8 Patch 2 - Build 1443 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Note: This readme file was current as of the date above. However, all customers are advised to check Trend Micro's web site for documentation updates at: http://www.trendmicro.com/download/ Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro web site. Register during installation or online at: http://olr.trendmicro.com/ Contents =================================================================== 1. About ServerProtect 1.1 Overview of this Release 1.2 Who Should Install this Release 2. What's New 2.1 Enhancements 2.2 Resolved Known Issues 3. Documentation Set 4. System Requirements 5. Installation/Uninstallation 5.1 Installation 5.2 Uninstallation 6. Post-installation Configuration 7. Known Issues 8. Release History 9. Files Included in This Release 10. Contact Information 11. About Trend Micro 12. License Agreement =================================================================== 1. About ServerProtect ====================================================================== ServerProtect is an award-winning software that protects file servers on corporate networks. It is specifically designed to protect the entire network from viruses of any kind by adopting advanced virus-catching technology to help ensure that your network stays virus-free. ServerProtect detects new file infections, identifies viruses in existing files, and detects activity indicating that an unknown virus may have entered the network environment on either the server or workstation. 1.1 Overview of this Release =================================================================== Patch 2 includes all the modifications since ServerProtect for EMC Celerra 5.80 General Release Build 1229. 1.2 Who Should Install this Release =================================================================== You should install this patch if you are running ServerProtect for EMC Celerra 5.80 Build 1229 or any higher version. 2. What's New ====================================================================== Note: Please install this Patch before completing any procedure in this section (see "Installation"). This Patch addresses the following issues and includes the following enhancements: 2.1 Enhancements =================================================================== Patch 2 contains the following enhancements: Enhancement 1: [Hot Fix 1360] Normal Server Updates - Users can now configure an Information Server to regularly check the build version of Normal Servers and to automatically send a command to a Normal Server to download and apply the latest hot fix or patch if it detects that the Normal Server's build version is lower than the latest hot fix or patch on the Information Server. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 1: To configure this option: a. Install this Patch (see "Installation"). b. Open a registry editor on the Information Server. c. Add the following keys and set the appropriate values. Paths: - 32-bit Information Servers: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ ServerProtect\CurrentVersion - 64-bit Information Servers: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ TrendMicro\ServerProtect\CurrentVersion Keys: - AutoUpdateNS=1, enables the feature =0, (default) disables the feature - AutoUpdateNSTime= frequency at which the Information checks the build version of Normal Servers in minutes divided by two, the default value is 30 which means 30*2=60 minutes or 1 hour Type: DWORD Enhancement 2: [Hot Fix 1360] Product Information Updates - ServerProtect now regularly sends product information updates to the BIF server. These updates contain product information including the activation keys for ServerProtect and use the "template.xml" file. Enhancement 3: Trend Micro Management Communication Protocol (MCP) - ServerProtect for EMC Celerra now supports MCP and allows users to register it to Trend Micro Control Manager(TM) through the ServerProtect Management Console. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 3: To configure this option: a. Install the "tmcm-55-win-en-sp1-patch4" update or any higher version for Control Manager 5.5, or install the "tmcm_60_sp1_win_en_hfb2182" update or any higher version release for Control Manager 6.0. b. Install this Patch and install the MCP CMAgent or migrate Trend Micro Infrastructure (TMI) CMAgent to MCP CMAgent (see "Installation"). c. Click "Start > ServerProtect Management Console". d. Access the "CMAgent Setting" screen by clicking "CMAgent Settings" on the side bar or by clicking "Do > CMAgent Setting" on the main menu. e. Input the required information, and register to Control Manager (refer to the online help of the ServerProtect Management Console for more information). Note: After configuring this option, ServerProtect may display the wrong group folder name on the Management Console. See "Known Issues" for more information about this known issue. 2.2 Resolved Known Issues =================================================================== Patch 2 resolves the following issues: Issue 1: ServerProtect 5.8 is unable to update the spyware pattern from version 0.9xx.00 to 1.xxx.00 or any higher version. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: [Critical Patch 1] This critical patch enables ServerProtect 5.8 to update the spyware pattern from version 0.9xx.00 to 1.xxx.00 or any higher version. Issue 2: A handle leak issue occurs on "SpntSvc.exe". ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: [Hot Fix 1283] This hot fix resolves the handle leak issue. Issue 3: The "Last time signature updated" field on the EMC console contains incorrect information. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: [Hot Fix 1291] This hot fix resolves this issue Issue 4: A vulnerability in the "mrf.exe" module of the TMI service may allow an attacker to execute arbitrary codes on vulnerable installations of CMAgent. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 4: [Critical Patch 2 EN] This critical patch removes the vulnerability to prevent malicious attacks. Issue 5: A scheduled deploy task's "Next Schedule Time" setting is not updated after each scheduled deployment. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 5: [Hot Fix 1315] This hot fix ensures that a scheduled deploy task's "Next Schedule Time" setting is updated after each scheduled deployment. Issue 6: Sometimes, Control Manager cannot deploy engine files to two or more Normal Servers simultaneously. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 6: [Critical Patch 1345] This critical patch ensures that Normal Servers can successfully receive engine file deployment commands from Control Manager. Issue 7: Control Manager shows the wrong operating system name for Information Servers and Normal Servers that are deployed on the Windows Server 2012 platform. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 7: [Critical Patch 1345] This critical patch ensures that Control Manager shows the correct operating system name for each Information Server and Normal Server. Issue 8: Outbreak Prevention Services cannot be deployed from Control Manager to Normal Servers that have been deployed on the Windows Server 2008 or Windows Server 2012 platform. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 8: [Critical Patch 1345] This critical patch ensures that Outbreak Prevention Services can be successfully deployed from Control Manager to Normal Servers that have been deployed on the Windows Server 2008 or Windows Server 2012 platform. Issue 9: The way TmNotify decides whether it should send an "EHLO" or a "HELO" command to an SMTP server does not comply with RFC 2821. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 9: [Hot Fix 1436] This hot fix changes the behavior of TmNotify when deciding whether to send a "EHLO" or a "HELO" command to an SMTP server to comply with RFC 2821. Issue 10: Some SMTP servers send the response message for the "EHLO" command in two parts. However, since the TmNotify module attempts to process the response immediately after receiving the first half of the response without waiting for the second half, TmNotify would not be able to properly handle the response message. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 10: [Hot Fix 1436] This hot fix enables the TmNotify module to wait until it receives both parts of the response message for the "EHLO" command before processing it. Issue 11: The wrong time information appears in email notifications because TmNotify cannot handle the summer time zone correctly. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 11: [Hot Fix 1436] This hot fix enables TmNotify to correctly handle the summer time zone to ensure that the correct time information appears in email notifications. 3. Documentation Set ====================================================================== In addition to this readme.txt, the documentation set for this product includes the following: o Administrator's Guide (AG) -- Provides post-installation instructions on how to configure the settings to help you get ServerProtect "up and running". Also includes instructions on performing other administrative tasks for the day-to-day maintenance of ServerProtect. o Getting Started (or Administrator's) Guide -- product overview, installation planning, installation and configuration instructions, and basic information intended to get you "up and running." o Readme.txt files -- version enhancements, basic installation, known issues, and release history. o Electronic versions of the printed manuals are available at: http://docs.trendmicro.com/ o Online help -- Context-sensitive help screens that provide guidance for performing a task. o TrendEdge is a program for Trend Micro employees, partners, and other interested parties that provides information on unsupported, innovative techniques, tools, and best practices for Trend Micro products. The TrendEdge database contains numerous documents covering a wide range of topics. http://trendedge.trendmicro.com o Knowledge Base -- a searchable database of known product issues, including specific problem-solving and troubleshooting topics. http://esupport.trendmicro.com 4. System Requirements ====================================================================== Refer to the ServerProtect 5.80 for EMC Celerra readme file for the complete list of system requirements. 5. Installation/Uninstallation ====================================================================== 5.1 Installation =================================================================== To apply this Patch from the same computer as the Information Server: 1. Close the Management Console. If this is not running at the time of installation, proceed with the next step. 2. Copy the "spemc_580_win_en_patch2.exe" patch installation file to a temporary folder. 3. Run the Patch file. The license screen appears. 4. If you disagree with the terms of the legal agreement, choose the "I do not agree with the terms of the legal agreement." option and click "Cancel" to abort the installation. Otherwise, choose the "I accept the terms of the legal agreement" and click "Next". The "readme" appears. 5. Read the contents of the readme carefully and click "Install". A message-box appears to remind you that the TMI CMAgent will be migrated to the MCP CMAgent. If you are not upgrading the TMI CMAgent to the MCP CMAgent, click "No" and the installation will not continue. Otherwise, click "Yes". Notes: - Once the TMI CMAgent is installed on the Information Server, the TMI agent will be automatically upgraded to the MCP CMAgent. - If the TMI CMAgent is not installed on the Information Server, a "Trend Micro strongly recommends installing MCP Control Manager Agent for ServerProtect. Click Yes to install MCP Control Manager Agent for ServerProtect now, or click No to install it later." message box appears after copying all patch files. If you want to install the MCP CMAgent click "Yes", otherwise, click "No". The "MCP_CMAgent.exe" installation package will be copied to the ".\SProtect\SMS\CMAgent\" folder. You can run the package to install the MCP CMAgent. - The Information Server deploys the Patch to Normal Servers 30 seconds after the installation is completed and restarts the ServerProtect services. If the installation does not complete successfully, contact Trend Micro technical support. To apply this Patch to a Management Console that is not associated with the computer hosting the Information Server: 1. Apply the Patch to the Information Server. 2. Close the Management Console. 3. Go to the Management Console home directory and backup the following five files to another location. - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - spuninst.exe - spuninstrc.DLL 4. On the Information Server, copy the following files from the Information Server home directory to the Management Console home directory to overwrite the local files. - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - spuninst.exe - spuninstrc.DLL 5.2 Uninstallation =================================================================== To roll back to the previous build: 1. On the Normal Server, run the following shell command to stop the Normal Server service: net stop spntsvc 2. If you have installed the MCP CMAgent for ServerProtect on the Information Server, manually remove it from the Control Pane, otherwise, proceed to the next step. Note: The following steps may fail if the MCP CMAgent for ServerProtect is installed on the Information Server. 3. On the Information Server, run the following shell command to stop the Information Server service: net stop earthagent 4. On the Normal Server, rename the backup files in the ServerProtect home directory and use them to replace the current files. The names of the backup files have "bak" in the extension. 5. On the Information Server, open the Information Server's home directory and copy the files from the ".\backup\filegroup10" folder. 6. On the Normal Server, run the following command to start the Normal Server service: net start spntsvc 7. On the Information Server, run the following command to start the Information Server service: net start earthagent 8. If the Management Console is not associated with the computer that is hosting the Information Server: a. Close the Management Console. b. On the Information Server, copy the following files from the Information Server home directory to the Management Console home directory to overwrite the local files. - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - spuninst.exe - spuninstrc.DLL Note: ServerProtect 5.8 will no longer support the Trend Micro Infrastructure (TMI) CMAgent after this patch is released. 6. Post-installation Configuration ====================================================================== No post-installation steps are required. Note: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing this Patch. 7. Known Issues ====================================================================== The following are the known issues in this release: 7.1 Anti-Rootkit driver may not be installed successfully if users do not restart the computer after a Microsoft Windows update. =================================================================== To resolve this issue, users need to restart the computer after a Microsoft Windows update. This allows a successful Anti-Rootkit driver installation. 7.2 ServerProtect may display an incorrect group folder name on CM Agent Settings screen on Management Console. =================================================================== This Patch upgrades TMI Control Manager Agent for ServerProtect to MCP Control Manager Agent. Since the group folder name of ServerProtect entities is saved in the Control Manager database, ServerProtect will not be able to retrieve the folder name after the upgrade, and displays the folder name as "New Entity". However, ServerProtect keeps all the entities under the original folder. To resolve this known issue: 1. Unregister ServerProtect from Control Manager through the ServerProtect Management Console. 2. Rename the group folder name. 3. Register ServerProtect to Control Manager. 7.3 Patch installation may fail when the installation package cannot load certain dll files. =================================================================== The Patch installation may failed on some environments because the Microsoft C Runtime Library is missing. To resolve this issue: 1. Download and install "Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package MFC Security Update" from: http://www.microsoft.com/en-us/download/confirmation.aspx?id=26347 2. Install this Patch again. 8. Release History ====================================================================== Previous releases include the following: - ServerProtect for Microsoft Windows and Netware 5.80 Patch 1, October 10, 2010 8.1 Patch 1 =================================================================== 8.1.1 Enhancements =================================================================== Patch 1 does not contain any enhancement. 8.1.2 Resolved Known Issues =================================================================== Patch 1 resolves the following issues: Issue 1: When users right-click the "Virus Cleanup Engine" column on the Management Console, the corresponding details are shown correctly. However, when users close and reopen the Management Console, the "Virus Cleanup Engine" column disappears. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This issue has been resolved. Issue 2: The Normal Server restarts when the deploy task includes the RCM even when all components are up-to-date. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This issue has been resolved. Issue 3: The Information Server encounters a general protection fault (GPF) while decrypting Remote Procedure Call (RPC) commands from the Normal Server. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: The Information Server now decrypts RPC commands from the Normal Server without issues. Issue 4: The Normal Server stops unexpectedly when users click the Normal Server to view logs from the management console. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 4: The multi-thread mutex mechanism for querying the log database has been improved to resolve this issue. Issue 5: When a user restores the Information Server from the backup data, the created Task Data cannot be restored successfully. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 5: This issue has been resolved. Issue 6: Some users encounter a high CPU usage issue after a pattern update. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 6: Users can now disable "tsc.exe" to prevent the high CPU usage issue. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 6: To disable "tsc.exe", create the following key and set its value to "1": Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ ServerProtect\CurrentVersion\SpntService Key: DisableTSCAfterPatternUpdate Type: DWORD Values: "1" = disables "tsc.exe" "0" = enables "tsc.exe" Issue 7: The generated email notification message IDs are incorrect. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 7: This issue has been resolved. Issue 8: By default, when "SpntSvc" starts, it waits for the Damage Cleanup Engine (DCE) to complete its scan before continuing with its own start up process. If DCE takes too long to scan, "SpntSvc" times out and does not start. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 8: This issue has been resolved. Issue 9: When a pattern file update runs before a previous update task completes, the pattern file update fails. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 9: This issue has been resolved by: - enabling ServerProtect to support multiple update tasks running simultaneously. - adding a time-out mechanism for update tasks. After applying Patch 1, ServerProtect automatically terminates update tasks that do not complete within 30 minutes and creates new update tasks for these. Issue 10: Trend Micro Vulnerability Scanner can only detect ServerProtect versions released before version 5.8. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 10: ServerProtect 5.8 can now process specific unencrypted RPC commands from the Trend Micro Vulnerability Scanner. This enables Trend Micro Vulnerability Scanner to detect ServerProtect 5.8. Issue 11: Some unreadable characters may be inserted in the subject headers of SMTP notification email messages when these subject headers are encoded. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 11: Users can now enable or disable the encoding of email subject headers. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 11: To enable or disable the encoding of email subject headers, add the following key to the registry and set the appropriate value: Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ ServerProtect\CurrentVersion\Notification Key: EnableEncode Type: DWORD Value: "0", disables the encoding of email subject headers "1", enables the encoding of email subject headers Issue 12: ServerProtect 5.80 Information Servers cannot deploy pattern information to managed ServerProtect 5.58 Normal Servers. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 12: This issue has been resolved. Issue 13: Blue screen of death (BSOD) may occur in "SpntSvc.exe" when Normal Server tries to retrieve pattern file information. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 13: ServerProtect now uses an exclusion algorithm for pattern-related APIs which prevents the BSOD issue. Issue 14: Sometimes, some unreadable characters are inserted in the message body of SMTP notification email messages. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 14: ServerProtect now converts the message body of SMTP notification email messages from Shift-JIS format to JIS format. Issue 15: "Spntsvc.exe" stops unexpectedly. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 15: The RPC communication process between Information Servers and Normal Servers has been improved to resolve this issue. Issue 16: ServerProtect 5.80 for EMC Celerra uses the SSAPTN pattern (component id = 0x20000400) to scan for spyware/grayware. However, status logs that the ServerProtect agent sends to the Control Manager server contain the following incorrect line:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 16: Users can now configure the ServerProtect agent to use "SLF_TMASSA" instead of "SLF_SpywareVersion" in status logs that it sends to the Control Manager server. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 16: To configure the ServerProtect agent to use "SLF_TMASSA" in status logs that it sends to the Control Manager Server, create the following key and set its value to "1": Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ TrendMicro Control Manager Agent\SPNT Key: EnableTMASSA Type: DWORD Value: "0", use "SLF_SpywareVersion" "1", use "SLF_TMASSA" 9. Files Included in this Release ====================================================================== Module File Name Build No. ------------------------------------------------------------------- Management Console AgentClient.dll 5.80.0.1443 Admin.exe 5.80.0.1443 Adm_enu.dll 5.80.0.1443 ADM_ENU.chm n/a spuninst.exe 5.80.0.1443 Spuninstrc.dll 5.80.0.1443 Control Manager Agent libEN_Product.dll 5.80.0.1443 Uninst.dll 5.80.0.1443 Entitymain.exe 2.50.0.1411 EN_Utility.dll 2.50.0.1411 LibEN_Conf.dll 2.50.0.1411 LibEN_Logger.dll 2.50.0.1411 libEN_SendLog.dll 2.50.0.1411 data1.cab n/a data1.hdr n/a setup.ilg n/a setup.inx n/a MCP_CMAgent.exe 12.0.0.58849 MigrationToolEn.exe 12.0.0.58849 Information Server AgentClient.dll 5.80.0.1443 ADM_ENU.chm n/a CheckEVC.dll 5.80.0.1443 DeployTool.exe 5.80.0.1443 Earthagent.exe 5.80.0.1443 EventMsg2.dll 5.80.0.1443 GetRemoteVer.dll 5.80.0.1443 Notification.dll 5.80.0.1443 RemoteInstall.exe 5.80.0.1443 StRpcCln.dll 5.80.0.1443 Spuninst.exe 5.80.0.1443 Spuninstrc.dll 5.80.0.1443 StCommon.dll 5.80.0.1443 StUpdate.exe 5.80.0.1443 TmNotify.dll 5.80.0.1443 BIFSender.exe 5.80.0.1443 libcurl.dll 7.17.1.0 libeay32.dll 1.0.0.1 ssleay32.dll 1.0.0.1 zlib.dll 1.2.2.0 32-bit Normal Server AgentClient.dll 5.80.0.1443 AgRpcCln.dll 5.80.0.1443 CheckEVC.dll 5.80.0.1443 DCE.dll 5.80.0.1443 eng50.dll 5.80.0.1443 EventMsg2.dll 5.80.0.1443 GetRemoteVer.dll 5.80.0.1443 LogDb.dll 5.80.0.1443 LogDBTool.dll 5.80.0.1443 LogMaster.dll 5.80.0.1443 Notification.dll 5.80.0.1443 Quarantine.exe 5.80.0.1443 SpntSvc.exe 5.80.0.1443 spuninst.exe 5.80.0.1443 Spuninstrc.dll 5.80.0.1443 StCommon.dll 5.80.0.1443 StRpcCln.dll 5.80.0.1443 StRpcSrv.dll 5.80.0.1443 StUpdate.exe 5.80.0.1443 TmNotify.dll 5.80.0.1443 TmOpp.dll 5.80.0.1443 64-bit Normal Server AgentClient.dll 5.80.0.1443 AgRpcCln.dll 5.80.0.1443 CheckEVC.dll 5.80.0.1443 DCE.dll 5.80.0.1443 eng50.dll 5.80.0.1443 EventMsg2.dll 5.80.0.1443 GetRemoteVer.dll 5.80.0.1443 LogDb.dll 5.80.0.1443 LogDBTool.dll 5.80.0.1443 LogMaster.dll 5.80.0.1443 Notification.dll 5.80.0.1443 Quarantine.exe 5.80.0.1443 SpntSvc.exe 5.80.0.1443 spuninst.exe 5.80.0.1443 Spuninstrc.dll 5.80.0.1443 StCommon.dll 5.80.0.1443 StRpcCln.dll 5.80.0.1443 StRpcSrv.dll 5.80.0.1443 StUpdate.exe 5.80.0.1443 StUpadte_32.exe 5.80.0.1443 TmNotify.dll 5.80.0.1443 TmOpp.dll 5.80.0.1443 Patch files Tmpatch.exe 2.2.0.1008 readme.txt n/a hotfix.ini n/a license.txt n/a 10. Contact Information ====================================================================== A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees. You can contact Trend Micro via fax, phone, and email, or visit us at: http://www.trendmicro.com Evaluation copies of Trend Micro products can be downloaded from our web site. Global Mailing Address/Telephone Numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 11. About Trend Micro ====================================================================== Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit www.trendmicro.com. Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, Control Manager, and ServerProtect are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 12. License Agreement ====================================================================== Information about your license agreement with Trend Micro can be viewed at: http://us.trendmicro.com/us/about/company/user_license_agreements/ Third-party licensing agreements can be viewed: - By selecting the "About" option in the application user interface - By referring to the "Legal" page of the Getting Started Guide or Administrator's Guide