1. Critical Patch Release Information

Resolved Known Issues

This Critical Patch resolves the following issue(s):

Issue 1 (SEG-148650),

An issue related to case-sensitivity settings may result in unsuccessful Active Directory synchronization.

Solution

This Critical Patch resolves the issue.

Issue 2 (VRTS-8108),

A known vulnerability (CVE-2018-1285) is found in Apache log4net 2.0.10 and earlier versions.

Solution

This Critical Patch updates the log4net version in Apex Central to enhance product security.

Issue 3 (SEG-159394),

Active Directory user names containing a single quote character may cause the system to send email messages with the one-time report every minute.

Solution

This Critical Patch resolves the issue.

Issue 4 (SEG-158223),

An issue related to security headers causes the "Control traffic on isolated endpoints" setting to be unconfigurable.

Solution

This Critical Patch resolves the issue.

Issue 5 (SEG-160327),

A missing byte-order mark (BOM) in the CSV file exported from the User-Defined Suspicious Objects screen causes the system to display garbled text on the web console after importing the file.

Solution

This Critical Patch resolves the issue.

Issue 6 (VRTS-8508),

A known vulnerability (CVE-2022-31629) is found in PHP 7.4.32 and earlier versions.

Solution

This Critical Patch updates the PHP version in Apex Central to enhance product security.

Issue 7 (VRTS-7534),

A Session Fixation vulnerability is found in Apex Central.

Solution

This Critical Patch updates the related modules to protect against a potential security issue.

Issue 8 (SEG-160595),

No logs display when users single sign-on to Apex One and try to perform a log search from the Agent Tree or view detection logs from the Dashboard.

Solution

This Critical Patch resolves the issue.

Enhancements

The following enhancements are included in this Critical Patch:

Enhancement 1 (PDGJIRA-2264),

This Critical Patch adds a new CEF key "TMCMdevicePlatform" to include the operating system information in all detection syslogs.

Enhancement 2 (VRTS-8115),

This Critical Patch fixes the SQL injection security issue.

Enhancement 3 (SEG-150924),

This Critical Patch enhances the performance of historical investigation when multiple Apex One servers are connected to Apex Central.

Enhancement 4 (SEG-157664),

This Critical Patch enables Apex Central to support the "Network Content Inspection Engine (5.14, Kernel mode, 64-bit, Conf: 6500)" component for Trend Micro Deep Discovery Inspector 6.5.

Enhancement 5 (VRTS-7853),

This Critical Patch updates the related modules to prevent the username information from being exposed in the Uniform Resource Locator (URL).

Enhancement 6 (PDGJIRA-2305),

This Critical Patch enables Apex Central to display Apex One (Mac) policies in Product Status View.

Files Included in This Release

There are no files included in this Critical Patch release.

2. Documentation Set

To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com

  • Online Help: The Online Help contains an overview of features and key concepts, and information on configuring and maintaining the product.


To access the Online Help, go to http://docs.trendmicro.com

  • Installation Guide (IG): The Installation Guide contains information on requirements and procedures for installing and deploying the product.
  • Administrator's Guide (AG): The Administrator's Guide contains an overview of features and key concepts, and information on configuring and maintaining the product.
  • Support Portal: The Support Portal contains information on troubleshooting and resolving known issues.
  • To access the Support Portal, go to http://success.trendmicro.com

3. System Requirements

1. Trend Micro Apex Central Build 3906 - Traditional Chinese - Windows - x32-x64

4. Installation

Installing

No special instructions are provided.

Uninstalling

No special instructions are provided.

5. Post-installation Configuration

No post-installation steps are required.

6. Known Issues

There are no known issues for this Critical Patch release.

7. Release History

Prior Hotfixes

Only this Critical Patch was tested for this release. Prior hotfixes were tested at the time of their release.
Issue Hotfix 6258 (SEG-154794), (SEG-153403),

Solution

Issue Hotfix 6258 (SEG-153275),

Solution

Issue Hotfix 6258 (SEG-123760),

Solution

Issue Hotfix 6258 (SEG-156789),

Solution

Issue Hotfix 6258 (VRTS-7863),

Solution

Issue Hotfix 6258 (SEG-153500), (SEG-157658),

Solution

Issue Hotfix 6258 (SEG-142093),

Solution

Issue Hotfix 6258 (SEG-151882),

Solution

Issue Hotfix 6258 (SEG-154867),

Solution

Enhancement Hotfix 6258 (SEG-153573), (SEG-154539),
Enhancement Hotfix 6258 (PDGJIRA-991),
Issue Hotfix 6240 (SEG-154853), (SEG-155045),

Solution

Issue Hotfix 6240 (SEG-149081),

Solution

Issue Hotfix 6240 (SEG-151369),

Solution

Issue Hotfix 6240 (SEG-151396),

Solution

Issue Hotfix 6240 (VRTS-6511),

Solution

Issue Hotfix 6240 (SEG-7776), (SEG-7777),

Solution

Issue Hotfix 6240 (SEG-155575),

Solution

Enhancement Hotfix 6240 (SEG-152849),
Enhancement Hotfix 6240 (SEG-154549),
Enhancement Hotfix 6240 (SEG-150064), (PDGJIRA-2233),
Enhancement Hotfix 6240 (SEG-149902),
Enhancement Hotfix 6240 (PDGJIRA-1726),
Enhancement Hotfix 6240 (PDGJIRA-1726),
Issue Hotfix 6048 (SEG-135334),

Solution

Issue Hotfix 6048 (SEG-137258), (SEG-125537),

Solution

Issue Hotfix 6048 (SEG-135009), (PDGJIRA-1051),

Solution

Issue Hotfix 6048 (SEG-137512),

Solution

Issue Hotfix 6048 (SEG-135260),

Solution

Issue Hotfix 6048 (SEG-126617),

Solution

Issue Hotfix 6048 (SEG-137795),

Solution

Issue Hotfix 6048 (VRTS-7108),

Solution

Enhancement Hotfix 6048 (SEG-125214),
Enhancement Hotfix 6048 (SEG-135544),
Enhancement Hotfix 6048 (SEG-134015),
Issue Hotfix 5639 (SEG-97846),

Solution

Issue Hotfix 5639 (SEG-89050),

Solution

Issue Hotfix 5639 (SEG-99776),

Solution

Issue Hotfix 5639 (SEG-99204),

Solution

Issue Hotfix 5639 (SEG-99751), (SEG-99824),

Solution

Issue Hotfix 5639 (SEG-95490),

Solution

Issue Hotfix 5639 (SEG-96935),

Solution

Issue Hotfix 5639 (SEG-98596),

Solution

Issue Hotfix 5639 (SEG-87216),

Solution

Issue Hotfix 5639 (SEG-100949),

Solution

Issue Hotfix 5639 (SEG-101405),

Solution

Issue Hotfix 5639 (SEG-96936),

Solution

Issue Hotfix 5639 (SEG-96186),

Solution

Issue Hotfix 5639 (SEG-96599),

Solution

Issue Hotfix 5639 (SEG-100596),

Solution

Issue Hotfix 5639 (SEG-99101),

Solution

Issue Hotfix 5639 (SEG-96866),

Solution

Issue Hotfix 5639 (SEG-93235),

Solution

Issue Hotfix 5639 (SEG-102461),

Solution

Issue Hotfix 5639 (SEG-99144),

Solution

Issue Hotfix 5639 (SEG-98424),

Solution

Issue Hotfix 5639 (SEG-94993),

Solution

Issue Hotfix 5639 (SEG-96422),

Solution

Issue Hotfix 5639 (SEG-93638),

Solution

Issue Hotfix 5639 (SEG-103464),

Solution

Enhancement Hotfix 5639 (SEG-86135),
Enhancement Hotfix 5639 (SEG-99952),
Enhancement Hotfix 5639 (SEG-84618),
Enhancement Hotfix 5639 (SEG-95029), (SEG-98214),
Enhancement Hotfix 5639 (SEG-100904),
Enhancement Hotfix 5639 (SEG-100906),
Enhancement Hotfix 5639 (SEG-97203),
Enhancement Hotfix 5639 (SEG-98984),
Enhancement Hotfix 5639 (SEG-96851), (SEG-101033),
Issue Critical Patch 5534 (SEG-94001),

Solution

Issue Critical Patch 5534 (SEG-93629),

Solution

Issue Critical Patch 5534 (VRTS-5342),

Solution

Issue Critical Patch 5534 (SEG-96376),

Solution

Issue Critical Patch 5534 (SEG-96075),

Solution

Issue Critical Patch 5534 (SEG-83960),

Solution

Issue Critical Patch 5534 (SEG-82535),

Solution

Issue Critical Patch 5534 (SEG-92408),

Solution

Issue Critical Patch 5534 (SEG-92560),

Solution

Issue Critical Patch 5534 (VRTS-5412),

Solution

Issue Critical Patch 5534 (VRTS-5448),

Solution

Issue Critical Patch 5534 (VRTS-5341),

Solution

Issue Critical Patch 5534 (SEG-95880),

Solution

Issue Critical Patch 5534 (SEG-90588),

Solution

Issue Critical Patch 5534 (SEG-95247),

Solution

Enhancement Critical Patch 5534 (SEG-92035),
Enhancement Critical Patch 5534 (SEG-91537),
Enhancement Critical Patch 5534 (SEG-97048),
Enhancement Critical Patch 5534 (SEG-78060),
Enhancement Critical Patch 5534
Enhancement Critical Patch 5534 (SEG-91885),
Issue Hotfix 5449 (SEG-83297),

Solution

Issue Hotfix 5449 (SEG-91264),

Solution

Issue Hotfix 5449 (SEG-89339),

Solution

Issue Hotfix 5449 (SEG-88353),

Solution

Issue Hotfix 5449 (SEG-91976),

Solution

Issue Hotfix 5449 (SEG-83319),

Solution

Issue Hotfix 5449 (SEG-92672),

Solution

Issue Hotfix 5449 (SEG-90645),

Solution

Issue Hotfix 5449 (SEG-92121),

Solution

Issue Hotfix 5449 (SEG-92671),

Solution

Issue Hotfix 5449 (SEG-85933),

Solution

Issue Hotfix 5449 (SEG-87216),

Solution

Issue Hotfix 5449 (SEG-88134),

Solution

Issue Hotfix 5449 (SEG-92823),

Solution

Issue Hotfix 5449 (SEG-87217), (SEG-91532),

Solution

Issue Hotfix 5449 (SEG-90191),

Solution

Issue Hotfix 5449 (SEG-92082),

Solution

Issue Hotfix 5449 (SEG-87618),

Solution

Issue Hotfix 5449 (SEG-82010),

Solution

Issue Hotfix 5449 (SEG-82724),

Solution

Issue Hotfix 5449 (SEG-79468),

Solution

Issue Hotfix 5449 (SEG-44878),

Solution

Issue Hotfix 5449 (SEG-84122),

Solution

Issue Hotfix 5449 (SEG-84979),

Solution

Issue Hotfix 5449 (SEG-83710),

Solution

Issue Hotfix 5449 (SEG-85722),

Solution

Issue Hotfix 5449 (SEG-75516),

Solution

Issue Hotfix 5449 (SEG-76147),

Solution

Issue Hotfix 5449 (SEG-39822), (SEG-82550),

Solution

Issue Hotfix 5449 (VRTS-4428),

Solution

Issue Hotfix 5449 (SEG-83240),

Solution

Issue Hotfix 5449 (SEG-82054),

Solution

Issue Hotfix 5449 (SEG-73320),

Solution

Issue Hotfix 5449 (SEG-73373),

Solution

Issue Hotfix 5449 (SEG-83354),

Solution

Issue Hotfix 5449 (PDGJIRA-7599),

Solution

Issue Hotfix 5449 (SEG-77893),

Solution

Issue Hotfix 5449 (SEG-84419),

Solution

Issue Hotfix 5449 (VRTS-4775),

Solution

Issue Hotfix 5449 (SEG-86056),

Solution

Issue Hotfix 5449 (SEG-82615),

Solution

Issue Hotfix 5449 (SEG-87203),

Solution

Issue Hotfix 5449 (SEG-82139),

Solution

Issue Hotfix 5449 (SEG-82045),

Solution

Issue Hotfix 5449 (SEG-87322),

Solution

Issue Hotfix 5449 (SEG-83675),

Solution

Issue Hotfix 5449 (SEG-76144),

Solution

Issue Hotfix 5449 (SEG-86854),

Solution

Issue Hotfix 5449 (SEG-83570),

Solution

Issue Hotfix 5449 (SEG-88731),

Solution

Issue Hotfix 5449 (SEG-73839),

Solution

Issue Hotfix 5449 (SEG-86689),

Solution

Enhancement Hotfix 5449 (SEG-89809),
Enhancement Hotfix 5449 (SEG-78622),
Enhancement Hotfix 5449 (SEG-89829),
Enhancement Hotfix 5449 (SEG-76695),
Enhancement Hotfix 5449 (SEG-90862),
Enhancement Hotfix 5449
Enhancement Hotfix 5449
Enhancement Hotfix 5449 (SEG-84232),
Enhancement Hotfix 5449 (SEG-79053),
Enhancement Hotfix 5449 (SEG-76695),
Enhancement Hotfix 5449 (SEG-76413),
Enhancement Hotfix 5449 (SEG-78710),
Enhancement Hotfix 5449 (SEG-84614),
Enhancement Hotfix 5449
Enhancement Hotfix 5449 (SEG-86857),
Enhancement Hotfix 5449 (SEG-57640),
Enhancement Hotfix 5449 (SEG-82919),
Enhancement Hotfix 5449 (SEG-89809),
Enhancement Hotfix 5449 (PDGJIRA-7668),
Enhancement Hotfix 5449 (PDGJIRA-7684),
Enhancement Hotfix 5449
Issue Hotfix 5243 (SEG-76601),

The banner on the "User-Defined Suspicious Objects" tab contains inaccurate information.

Solution

This hotfix ensures that the banner displays accurate information.

Issue Hotfix 5243 (SEG-71991),

Solution

Issue Hotfix 5243 (SEG-70172),

Solution

Issue Hotfix 5243 (SEG-80627),

Solution

Issue Hotfix 5243 (SEG-81320),

Solution

Issue Hotfix 5243 (SEG-81379),

Solution

Issue Hotfix 5243 (SEG-78345),

Solution

Issue Hotfix 5243 (SEG-79000),

Solution

Issue Hotfix 5243 (SEG-81846),

Solution

Issue Hotfix 5243 (SEG-80613),

Solution

Issue Hotfix 5243 (SEG-76127),

Solution

Issue Hotfix 5243 (SEG-82738),

Solution

Issue Hotfix 5243 (SEG-80624),

Solution

Issue Hotfix 5243 (SEG-65309),

Solution

Issue Hotfix 5243 (SEG-81742),

Solution

Issue Hotfix 5243 (SEG-79612),

Solution

Issue Hotfix 5243 (SEG-83614),

Solution

Issue Hotfix 5243

Solution

Enhancement Hotfix 5243 (SEG-74478),
Enhancement Hotfix 5243 (SEG-70114),
Enhancement Hotfix 5243 (SEG-81523), (SEG-82991),
Enhancement Hotfix 5243 (SEG-75186),
Enhancement Hotfix 5243 (SEG-76997),
Issue Hotfix 5104 (SEG-73934),

Solution

Issue Hotfix 5104 (SEG-77415),

Solution

Issue Hotfix 5104 (SEG-74460),

Solution

Enhancement Hotfix 5104
Enhancement Hotfix 5104
Enhancement Hotfix 5104
Enhancement Hotfix 5104
Issue Hotfix 4474 (SEG-66877),

Solution

Issue Hotfix 4473 (VRTS-4126),

Solution

Issue Hotfix 4473 (SEG-54954),

Solution

Issue Hotfix 4473 (SEG-54954),

Solution

Issue Hotfix 4473 (SEG-69895),

Solution

Enhancement Hotfix 4473 (SEG-60191),
Enhancement Hotfix 4473
Enhancement Hotfix 4473
Enhancement Hotfix 4473
Enhancement Hotfix 4473
Enhancement Hotfix 4473
Enhancement Hotfix 4473
Issue Hotfix 4363 (SEG-66418),

Solution

Issue Hotfix 4363 (SEG-62090),

Solution

Issue Hotfix 4363 (SEG-67181),

Solution

Issue Hotfix 4363 (SEG-3590),

Solution

Issue Hotfix 4363 (SEG-64901),

Solution

Issue Hotfix 4363 (SEG-67195),

Solution

Issue Hotfix 4363 (SEG-64392),

Solution

Issue Hotfix 4363 (SEG-66466),

Solution

Issue Hotfix 4363 (SEG-67182),

Solution

Issue Hotfix 4363 (SEG-66885),

Solution

Issue Hotfix 4363 (SEG-66418),

Solution

Issue Hotfix 4363 (SEG-65270),

Solution

Issue Hotfix 4363 (SEG-61428),

Solution

Issue Hotfix 4363 (SEG-64336),

Solution

Issue Hotfix 4363 (SEG-58419),

Solution

Issue Hotfix 4363 (VRTS-3589),

Solution

Issue Hotfix 4363 (SEG-56595),

Solution

Issue Hotfix 4363 (SEG-64156),

Solution

Issue Hotfix 4363 (VRTS-3849),

Solution

Issue Hotfix 4363 (SEG-60067),

Solution

Issue Hotfix 4363 (SEG-61089),

Solution

Issue Hotfix 4363 (SEG-61629), (SEG-61784),

Solution

Issue Hotfix 4363 (SEG-62153),

Solution

Issue Hotfix 4363 (SEG-61339),

Solution

Issue Hotfix 4363 (VRTS-3668),

Solution

Issue Hotfix 4363 (SEG-61440),

Solution

Issue Hotfix 4363 (SEG-56557),

Solution

Issue Hotfix 4363 (SEG-58852),

Solution

Issue Hotfix 4363 (SEG-58967),

Solution

Issue Hotfix 4363 (SEG-59166),

Solution

Issue Hotfix 4363 (SEG-56503),

Solution

Issue Hotfix 4363 (SEG-59272),

Solution

Issue Hotfix 4363 (SEG-56232),

Solution

Issue Hotfix 4363 (SEG-58234),

Solution

Issue Hotfix 4363 (SEG-56869),

Solution

Issue Hotfix 4363 (SEG-58224),

Solution

Issue Hotfix 4363 (SEG-51336),

Solution

Issue Hotfix 4363 (SEG-57402),

Solution

Issue Hotfix 4363 (SEG-64841),

Solution

Enhancement Hotfix 4363 (SEG-60909),
Enhancement Hotfix 4363 (SEG-67527),
Enhancement Hotfix 4363 (SEG-41899),
Enhancement Hotfix 4363 (SEG-56603),
Enhancement Hotfix 4363 (SEG-32094),
Enhancement Hotfix 4363 (SEG-32096),
Enhancement Hotfix 4363 (SEG-43637),
Enhancement Hotfix 4363 (SEG-61455),
Enhancement Hotfix 4363 (SEG-61185),
Enhancement Hotfix 4363 (SEG-63480),
Enhancement Hotfix 4363 (SEG-53909),
Enhancement Hotfix 4363 (SEG-63797),

Procedure

Enhancement Hotfix 4363 (SEG-59130),
Enhancement Hotfix 4363 (SEG-61384), (SEG-62946),
Enhancement Hotfix 4363 (SEG-63674),
Enhancement Hotfix 4363 (SEG-63674),
Enhancement Hotfix 4363 (SEG-63674),
Enhancement Hotfix 4363 (SEG-49778),
Enhancement Hotfix 4363 (SEG-52242),
Enhancement Hotfix 4363 (SEG-34121), (SEG-41962), (SEG-52917), (SEG-48792),
Enhancement Hotfix 4363 (SEG-43643),
Enhancement Hotfix 4363 (SEG-41902),
Enhancement Hotfix 4363 (SEG-56940),
Enhancement Hotfix 4363 (SEG-58041),
Enhancement Hotfix 4363 (SEG-43622),
Enhancement Hotfix 4363 (SEG-55073),
Enhancement Hotfix 4363 (SEG-58238),
Enhancement Hotfix 4363 (SEG-55846),
Enhancement Hotfix 4363 (SEG-56048),
Enhancement Hotfix 4363 (SEG-54994),
Enhancement Hotfix 4363 (SEG-44904),
Enhancement Hotfix 4363 (SEG-53604),
Issue Hotfix 3951 (SEG-56742),

An issue prevents automation APIs from relocating or uninstalling agents.

Solution

The hotfix helps ensure that agents can be relocated or uninstalled using automation APIs.

Issue Hotfix 3951 (SEG-48480), (SEG-48481),

The Web Console Timeout setting does not work normally.

Solution

This hotfix ensures that the Web Console Timeout setting works normally.

Issue Hotfix 3951 (SEG-52169),

Apex Central cannot overwrite policy settings when the Apex One agent changes a policy locally.

Solution

This hotfix ensures that policies are deployed normally.

Issue Hotfix 3951 (SEG-56525),

An I18N issue is found in Users/Endpoints.

Solution

This hotfix resolves the I18N issue.

Issue Hotfix 3951 (SEG-54122),

The pie chart in "DLP template Matches" widget displays the "Others" category even when the option is not selected.

Solution

This hotfix adds an additional filter logic to ensure that information categorized under "Others" does not appear in the pie chart when the option is not selected.

Issue Hotfix 3951 (SEG-54401),

Apex Central deploys the wrong action setting for IP-type User-Defined Suspicious Objects (UDSO) that have been added to the SO list using Custom Intelligence Automation APIs.

Solution

This hotfix ensures that the correct action for IP-type USDOs are deployed to managed products.

Issue Hotfix 3951 (SEG-56480),

The "Trusted Program List" of the Apex One Security Agent policy setting is case-sensitive.

Solution

This hotfix makes the "Trusted Program List" policy setting case-insensitive.

Issue Hotfix 3951 (SEG-55731),

Uses cannot download and save reports when there are non-English alphanumeric characters in the report name.

Solution

This hotfix resolves the issue so users can save and download reports using file names with non-English alphanumeric characters.

Issue Hotfix 3951 (SEG-56044),

Apex Central SaaS displays unrelated categories in static report template on Microsoft(TM) Internet Explorer(TM) 11.

Solution

The hotfix ensures that only the following four categories are displayed in static reports in Apex Central SaaS.

  • Executive summary
  • Desktop products
  • Data Loss Prevention
  • Data Discovery

Issue Hotfix 3951 (SEG-47407),

The "Virus Scan Engine (Windows XP/Server 2003, x64)" component name is no longer accurate since Control Manager stopped support for Microsoft(TM) Windows(TM) Server 2003.

Solution

This hotfix renames the "Virus Scan Engine (Windows XP/Server 2003, x64)" component to "Virus Scan Engine (Windows)".

Issue Hotfix 3951 (SEG-56611),

Apex Central stops synchronizing the suspicious object (SO) list from Trend Deep Discovery Analyzer once multiple Deep Discovery Analyzers have registered to Apex Central.

Solution

This hotfix ensures that Apex Central synchronizes the SO list successfully when multiple Deep Discovery Analyzers are registered to Apex Central.

Issue Hotfix 3951 (SEG-56555),

The "Pass/Log" action in "Intrusion Prevention" logs on log query results may confuse users.

Solution

This hotfix replaces the "Pass/Log" action on the log query results page to "Log" when in "detect only" mode.

Enhancement Hotfix 3951 (SEG-56425),

This hotfix enables Apex Central to add user name information in Device Control syslog messages.

Enhancement Hotfix 3951 (SEG-52539),

This hotfix ensures that sub services can restart normally after stopping unexpectedly.

Enhancement Hotfix 3951 (SEG-57251),

This hotfix enables Apex Central to apply policies promptly to an agent that originally does not have a policy once it triggers a filter policy because of changes to its properties, such as an IP change resulting in matching the filter policy's criteria, instead of waiting until the daily policy re-enforcement to apply policies on the agent.

Enhancement Hotfix 3951 (SEG-56849),

The original default values of "Maximum TCP Connections" and "Maximum UDP Connections" in the "Apex One Security Agent > Vulnerability Protection > Network Engine Setting" tab are too small and cause the generation of a large number of Intrusion Prevention logs.

This hotfix applies the following changes to limit the number of Intrusion prevention logs:

  • Increasing the minimum value of "Maximum TCP/UDP Connection" for the Network Engine Setting to "2000"
  • Changing the default value to "1000000"
  • Applying the new default value to policies created with original default values

8. Contact Information

A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees.

Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products.

https://www.trendmicro.com/en_us/contact.html

NOTE: This information is subject to change without notice.

9. About Trend Micro

Smart, simple, security that fits.

As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information.

Copyright 2022, Trend Micro Incorporated. All rights reserved.

Trend Micro, the t-ball logo, OfficeScan, Trend Micro Security (for Mac), Control Manager, Trend Micro Apex One, and Trend Micro Apex Central are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other product or company names may be trademarks or registered trademarks of their owners.

10. License Agreement

View information about your license agreement with Trend Micro at: https://www.trendmicro.com/en_us/about/legal.html

Third-party licensing agreements can be viewed:

  • By selecting the "About" option in the application user interface
  • By referring to the "Legal" page of the Administrator's Guide
Back to Top