Trend Micro HOME NETWORK 1.1 ユーザーズマニュアル

ページ / 38
Using the Trend Micro Dashboard
4
-
9
Table 4-1 lists suggested corrective actions when vulnerabilities are found.
T
ABLE
 4-1.
  
Vulnerabilities checked by Security Scan
What Security Scan Does
 Corrective Action
Microsoft vulnerabilities
Checks if known Microsoft 
vulnerabilities exist on your 
system
Visit the Microsoft Windows
TM
 
update site to download 
updates.
Trojan horse programs
Scans and detects Trojans
To remove Trojans, install 
Trend Micro Internet Security.
Spyware
Detects spyware and gives you 
the option to remove it
Use Anti-Spyware to remove 
spyware found by Security 
Scan. For real-time and 
scheduled spyware scanning, 
install Trend Micro Internet 
Security.
File sharing
Detects shared folders on your 
computer
Remove or restrict sharing 
permissions. To disable folder 
sharing, right-click the folder 
in Windows Explorer, click 
Properties, and then click 
Sharing. In Windows 2000 
and XP, click Do not share 
this folder
. In Windows 98 
and ME, click Not Shared.
Security software
Checks if you have installed 
well-known virus protection 
software, and how recently it 
has been updated
If you do not have virus 
protection software, or if your 
software is out of date, install 
Trend Micro Internet Security.