Anda di halaman 1dari 4

<<<<USE COURIER REGULAR 10 FONT IF YOU WOULD LIKE TO PRINT THIS DOCUMENT>>>>

Trend Micro, Inc.

Sep. 22nd, 2011

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Worry-Free Business Security Agent
Security Agent Uninstall Tool
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TERMS AND CONDITIONS: This tool was developed by Trend Micro, Inc.
This tool has received limited testing and is for your internal use
only. THIS TOOL IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND.
TREND MICRO MAKES NO WARRANTY ABOUT THE OPERATION OR PERFORMANCE OF
THIS TOOL NOR DOES IT WARRANT THAT THIS TOOL IS ERROR FREE. TO THE
FULLEST EXTENT PERMITTED BY LAW, TREND MICRO DISCLAIMS ALL IMPLIED AND
STATUTORY WARRANTIES, INCLUDING BUT NOT LIMITED TO THE IMPLIED
WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A
PARTICULAR PURPOSE. THIS TOOL IS SUBJECT TO CHANGE AND MODIFICATION,
INCLUDING, WITHOUT LIMITATION, CHANGES AND MODIFICATIONS WITH RESPECT
TO PERFORMANCE AND FUNCTIONALITY ANY TIME AT THE SOLE DISCRETION OF
TREND MICRO.
Contents
===================================================================
1. Overview of This Tool
1.1 Files Included in This Release
2. How to Use the Tool
2.1 Uninstall Security Agent
2.2 Unload Security Agent
3. Documentation Set
4. System Requirements
5. Installation
6. Post-Installation Configuration
7. Release History
8. Contact Information
9. About Trend Micro
10. License Agreement
===================================================================

1. Overview of This Tool


========================================================================
Security Agent Uninstall Tool is used to unload and/or uninstall
Security Agent or Client/Server Security Agent. Trend Micro
provides this tool to facilitate any needed troubleshooting during
the Worry-Free Business Security Agent (SA) uninstall process.
1.1 Files Included in This Release
======================================================================
Module Filename
Build No.
Stop.bat
Uninstall.bat
AgentRemoval\*.*
2. How to Use the Tool
========================================================================

2.1 Uninstall Security Agent


=======================================================
Step 1: Close all running programs, including:
o Internet Explorer
o Firefox
o Windows Live Mail
o Windows Mail
o Outlook
o Outlook Express
Step 2: Log onto Windows as Administrator or onto any account on
which you have Administrator rights
Step 3: On Windows 8.1, 8, 7, Vista, and 2012 R2, 2012, 2008 R2,
2008 Server right-click "Uninstall.bat" and select "Run
As Administrator". If the "User Access Control" dialog
appears, click "Yes".
On Windows XP/2003, double-click "Uninstall.bat".
Step 4: Wait a few minutes until this message appears:
-------------------------------------------------------Do you want to reboot now? (Y/N)
-------------------------------------------------------Press "N" and "Enter" if you do not want to reboot.
Note: Some drivers will not be removed.
Press "Y" and "Enter"; a 30-second countdown starts
after which the computer will restart.
Note: It is not necessary to run "Stop.bat" before uninstalling
Security Agent.
2.2 Unload Security Agent
=======================================================
Step 1: Log onto Windows as Administrator or onto any account on
which you have Administrator rights.
Step 2: On Windows 8.1, 8, 7, Vista, and 2012 R2, 2012, 2008 R2,
2008 Server right-click "Stop.bat" and select "Run As
Administrator". If the "User Access Control" dialog
appears, click "Yes".
On Windows XP/2003, double-click "Stop.bat".
Step 3: Wait for the program to end.
3. Documentation Set
========================================================================
o Readme.txt -- Contains basic installation and known issues.
Electronic versions of the printed manuals are available at:
http://downloadcenter.trendmicro.com/
4. System Requirements

========================================================================
o Computers with one of the following installed:
WFBS
WFBS
WFBS
WFBS

Client/Server Security Agent 5.0


Client/Server Security Agent 5.1
Client/Server Security Agent 6.0
Security Agent 7.0

o A folder on your local disk drive whose file path does not contain
parenthesis.
5. Installation
========================================================================
Copy the files of this tool to a folder on your local disk drive whose
file path does not contain parenthesis.
6. Post-Installation Configuration
========================================================================
Not applicable.
7. Release History
========================================================================
Not applicable.
8. Contact Information
========================================================================
A license to the Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support
for one (1) year from the date of purchase only. After the first
year, Maintenance must be renewed on an annual basis at Trend Micro's
then-current Maintenance fees.
You can contact Trend Micro via fax, phone, and email, or visit us at
http://www.trendmicro.com
Evaluation copies of all Trend Micro products can be downloaded from
our Web site.
Global Mailing Address/Telephone Numbers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For global contact information in the Asia/Pacific region, Australia
and New Zealand, Europe, Latin America, and Canada, refer to:
http://www.trendmicro.com/en/about/overview.htm
The Trend Micro "About Us" screen displays. Click the appropriate
link in the "Contact Us" section of the screen.
Note: This information is subject to change without notice.
9. About Trend Micro
========================================================================
Trend Micro Incorporated, a global leader in Internet content

security and threat management, aims to create a world safe for the
exchange of digital information for businesses and consumers.
A pioneer in server-based antivirus with over 20 years experience,
we deliver top-ranked security that fits our customers needs, stops
new threats faster, and protects data in physical, virtualized and
cloud environments. Powered by the Trend Micro
Smart Protection Network(TM) infrastructure, our industry-leading
cloud-computing security technology and products stop threats where
they emerge, on the Internet, and are supported by 1,000+
threat intelligence experts around the globe. For additional
information, visit www.trendmicro.com.
Copyright 2011, Trend Micro Incorporated. All rights reserved.
Trend Micro, the t-ball logo, Worry-Free Business Security are
trademarks of Trend Micro Incorporated and are registered in some
jurisdictions. All other marks are the trademarks or registered
trademarks of their respective companies.
10. License Agreement
========================================================================
Information about your license agreement with Trend Micro can be
viewed at:
http://us.trendmicro.com/us/about/company/user_license_agreements/
Third-party licensing agreements can be viewed:
- By selecting the "About" option in the application user
interface
- By referring to the "Legal" page or the "Getting Started" chapter
in the Administrator's Guide.
Built with WFBS-SVC 5.7.1153 (Fri 10/24/2014 12:33:38.53)

Anda mungkin juga menyukai