<<<>>> Trend Micro, Inc. Sep. 22nd, 2011 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Worry-Free Business Security Agent Security Agent Uninstall Tool ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ TERMS AND CONDITIONS: This tool was developed by Trend Micro, Inc. This tool has received limited testing and is for your internal use only. THIS TOOL IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND. TREND MICRO MAKES NO WARRANTY ABOUT THE OPERATION OR PERFORMANCE OF THIS TOOL NOR DOES IT WARRANT THAT THIS TOOL IS ERROR FREE. TO THE FULLEST EXTENT PERMITTED BY LAW, TREND MICRO DISCLAIMS ALL IMPLIED AND STATUTORY WARRANTIES, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE. THIS TOOL IS SUBJECT TO CHANGE AND MODIFICATION, INCLUDING, WITHOUT LIMITATION, CHANGES AND MODIFICATIONS WITH RESPECT TO PERFORMANCE AND FUNCTIONALITY ANY TIME AT THE SOLE DISCRETION OF TREND MICRO. Contents =================================================================== 1. Overview of This Tool 1.1 Files Included in This Release 2. How to Use the Tool 2.1 Uninstall Security Agent 2.2 Unload Security Agent 3. Documentation Set 4. System Requirements 5. Installation 6. Post-Installation Configuration 7. Release History 8. Contact Information 9. About Trend Micro 10. License Agreement =================================================================== 1. Overview of This Tool ======================================================================== Security Agent Uninstall Tool is used to unload and/or uninstall Security Agent or Client/Server Security Agent. Trend Micro provides this tool to facilitate any needed troubleshooting during the Worry-Free Business Security Agent (SA) uninstall process. 1.1 Files Included in This Release ====================================================================== Module Filename Build No. Stop.bat Uninstall.bat AgentRemoval\*.* 2. How to Use the Tool ======================================================================== 2.1 Uninstall Security Agent ======================================================= Step 1: Close all running programs, including: o Internet Explorer o Firefox o Windows Live Mail o Windows Mail o Outlook o Outlook Express Step 2: Log onto Windows as Administrator or onto any account on which you have Administrator rights Step 3: On Windows 8.1, 8, 7, Vista, and 2012 R2, 2012, 2008 R2, 2008 Server right-click "Uninstall.bat" and select "Run As Administrator". If the "User Access Control" dialog appears, click "Yes". On Windows XP/2003, double-click "Uninstall.bat". Step 4: Wait a few minutes until this message appears: -------------------------------------------------------- Do you want to reboot now? (Y/N) -------------------------------------------------------- Press "N" and "Enter" if you do not want to reboot. Note: Some drivers will not be removed. Press "Y" and "Enter"; a 30-second countdown starts after which the computer will restart. Note: It is not necessary to run "Stop.bat" before uninstalling Security Agent. 2.2 Unload Security Agent ======================================================= Step 1: Log onto Windows as Administrator or onto any account on which you have Administrator rights. Step 2: On Windows 8.1, 8, 7, Vista, and 2012 R2, 2012, 2008 R2, 2008 Server right-click "Stop.bat" and select "Run As Administrator". If the "User Access Control" dialog appears, click "Yes". On Windows XP/2003, double-click "Stop.bat". Step 3: Wait for the program to end. 3. Documentation Set ======================================================================== o Readme.txt -- Contains basic installation and known issues. Electronic versions of the printed manuals are available at: http://downloadcenter.trendmicro.com/ 4. System Requirements ======================================================================== o Computers with one of the following installed: WFBS Client/Server Security Agent 5.0 WFBS Client/Server Security Agent 5.1 WFBS Client/Server Security Agent 6.0 WFBS Security Agent 7.0 o A folder on your local disk drive whose file path does not contain parenthesis. 5. Installation ======================================================================== Copy the files of this tool to a folder on your local disk drive whose file path does not contain parenthesis. 6. Post-Installation Configuration ======================================================================== Not applicable. 7. Release History ======================================================================== Not applicable. 8. Contact Information ======================================================================== A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees. You can contact Trend Micro via fax, phone, and email, or visit us at http://www.trendmicro.com Evaluation copies of all Trend Micro products can be downloaded from our Web site. Global Mailing Address/Telephone Numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to: http://www.trendmicro.com/en/about/overview.htm The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 9. About Trend Micro ======================================================================== Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro Smart Protection Network(TM) infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit www.trendmicro.com. Copyright 2011, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, Worry-Free Business Security are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 10. License Agreement ======================================================================== Information about your license agreement with Trend Micro can be viewed at: http://us.trendmicro.com/us/about/company/user_license_agreements/ Third-party licensing agreements can be viewed: - By selecting the "About" option in the application user interface - By referring to the "Legal" page or the "Getting Started" chapter in the Administrator's Guide. Built with WFBS 9.0.1384 (Wed 02/19/2014 4:10:19.86)