<> Trend Micro, Inc. July 7, 2014 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Endpoint Application Control Agent Version 1.0 - Patch 1 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Notes: Trend Micro considers this file current as of the date above. However, all customers should check the Trend Micro website for documentation updates: http://www.trendmicro.com/download/ Register online during installation or within 30 days to continue downloading updates at the following website: http://olr.trendmicro.com Contents =================================================================== 1. What's New 2. Documentation Set 3. System Requirements 4. Installation 5. Post-Installation Configuration 6. Known Issues 7. Contact Information 8. About Trend Micro 9. License Agreement =================================================================== 1. What's New ======================================================================== This patch includes enhancements to Endpoint Application Control Server. No other enhancements are included in this patch. 2. Documentation Set ======================================================================== a. This README.txt file contains basic installation and configuration instructions, a list of known issues, and contact information. b. The installation and administration guides explain how to set up, configure, and customize the software. c. The online help explains specific features and provides guidance in performing tasks. 3. System Requirements ======================================================================== Install Endpoint Application Control Agent on computers with the following specifications: 3.1 Endpoint: - Endpoint Application Control Agent 1.0, included in the Server installer 3.2 Endpoint Operating System: - Windows (x86/x64) XP with Service Pack 2 or higher - Windows (x86/x64) Vista Editions - Windows (x86/x64) 7 Editions - Windows (x86/x64) 8, 8.1 Editions - Microsoft Windows (x86/x64) Server 2003, 2003 R2 - Microsoft Windows (x86/x64) Server 2008, 2008 Core, 2008 R2, 2008 R2 Core - Microsoft Windows Server 2012, 2012 R2 - Windows Embedded Enterprise, PoS Ready 2009, XPe, Standard 2009, Standard 7 3.3 Endpoint Browser: - Microsoft Internet Explorer 7.0 - Microsoft Internet Explorer 8.0 - Microsoft Internet Explorer 9.0 - Microsoft Internet Explorer 10.0 3.4 CPU, RAM and Disk Space: - Server systems and Virtualization support > 2GHz Intel Pentium processor or equivalent (32-bit) > 1GB of RAM > 350MB of available disk space - Windows 7 systems and Virtualization support > 1GHz Intel Pentium processor > 2GB of RAM > 350MB of available disk space - Windows Vista systems and Virtualization support > 1GHz Intel Pentium processor > 1.5GB of RAM > 350MB of available disk space - Windows XP systems and Virtualization support > 300MHz Intel Pentium processor or equivalent > 512MB of RAM > 350MB of available disk space 4. Installation ======================================================================== Refer to the Installation Guide for complete instructions. 5. Post-Installation Configuration ======================================================================== Refer to the Administrator's Guide for recommendations. 6. Known Issues ======================================================================== Here are the known issues in this release: 6.1 Short life cycle executables ================================ After creating a lockdown rule on the server and then deploying a policy on an endpoint that uses that rule, you can still successfully launch executables on the agent that have a life cycle of less than one second. 6.2 Log entries for unreported pending events ============================================= If you register an agent on a specific server and deploy a policy, then make the agent send reports back to a different server, the second server may receive log entries for pending events not yet reported to the original server. 6.3 Add exceptions after inventory scan ======================================= A lockdown rule will block applications not recorded after finishing an inventory scan. You can add an exception in "Applications Excluded from Lockdown" for the rule to solve the issue. 6.4 Remove Beta before installation =================================== If you already installed the Beta release (build 1153), uninstall the agent and server software before using the official release. 6.5 Windows 8 blocked application information ============================================= When a Windows Store app has been blocked, only the XML file path name is displayed in the window. No unique name of the Windows Store app displays. To get the correct information about the application, the administrator can look in the user folder under "web\data\event-log.xml". 6.6 New users and lockdown policy ================================= Initializing a new Windows user can take a long time. The process includes, for example, adding the Windows Store app paths for the account. If Endpoint Application Control Agent lockdown starts working before this process completes, some Windows Store apps will be blocked. To avoid this, the Windows administrator should create the new account on the endpoint before applying lockdown policy. 7. Contact Information ======================================================================== A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees. Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products. http://www.trendmicro.com Global Mailing Address/Telephone numbers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, please refer to: http://www.trendmicro.com/en/about/overview.htm When the Trend Micro "About Us" screen displays, click the appropriate link in the "Contact Us" section of the screen. Note: This information is subject to change without notice. 8. About Trend Micro ======================================================================== Trend Micro, Inc. provides virus protection, anti-spam, and content-filtering security products and services. Trend Micro allows companies worldwide to stop viruses and other malicious code from a central point before they can reach the desktop. Copyright 2014, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, and Trend Micro Titanium are trademarks of Trend Micro Incorporated and registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 9. License Agreement ======================================================================== Refer to the following website for information about your license agreement with Trend Micro: http://www.trendmicro.com/en/purchase/license