Trend Micro HOME NETWORK 1.1 ユーザーズマニュアル
Using the Trend Micro Dashboard
4
-
9
Table 4-1 lists suggested corrective actions when vulnerabilities are found.
T
ABLE
4-1.
Vulnerabilities checked by Security Scan
What Security Scan Does
Corrective Action
Microsoft vulnerabilities
Checks if known Microsoft
vulnerabilities exist on your
system
vulnerabilities exist on your
system
Visit the Microsoft Windows
TM
update site to download
updates.
updates.
Trojan horse programs
Scans and detects Trojans
To remove Trojans, install
Trend Micro Internet Security.
Trend Micro Internet Security.
Spyware
Detects spyware and gives you
the option to remove it
the option to remove it
Use Anti-Spyware to remove
spyware found by Security
Scan. For real-time and
scheduled spyware scanning,
install Trend Micro Internet
Security.
spyware found by Security
Scan. For real-time and
scheduled spyware scanning,
install Trend Micro Internet
Security.
File sharing
Detects shared folders on your
computer
computer
Remove or restrict sharing
permissions. To disable folder
sharing, right-click the folder
in Windows Explorer, click
Properties, and then click
Sharing. In Windows 2000
and XP, click Do not share
this folder. In Windows 98
and ME, click Not Shared.
permissions. To disable folder
sharing, right-click the folder
in Windows Explorer, click
Properties, and then click
Sharing. In Windows 2000
and XP, click Do not share
this folder. In Windows 98
and ME, click Not Shared.
Security software
Checks if you have installed
well-known virus protection
software, and how recently it
has been updated
well-known virus protection
software, and how recently it
has been updated
If you do not have virus
protection software, or if your
software is out of date, install
Trend Micro Internet Security.
protection software, or if your
software is out of date, install
Trend Micro Internet Security.