<> Trend Micro Incorporated December 13th, 2023 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) ServerProtect for EMC Celerra 5.8 - Patch2 English - Windows - 32-bit / 64-bit Critical Patch - Build 1618 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contents ================================================================ 1. Overview of This Critical Patch Release 1.1. Issues 1.2. Enhancements 1.3. Files Included in This Release 2. Documentation Set 3. System Requirements 4. Installation 4.1. Installing 4.2. Uninstalling 5. Post-installation Configuration 6. Known Issues 7. Release History 8. Contact Information 9. About Trend Micro 10. License Agreement ================================================================ 1. Overview of This Critical Patch Release ======================================================================== 1.1. Issues ==================================================================== This Critical Patch resolves the following issue(s): Issue 1: ServerProtect reported several virus alerts in Real-time Scan about virus "+" in "?." after the Virus Scan Engine had upgraded to 22.610-1017. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This Critical Patch resolves the issue. Issue 2: Process StOPP started unexpectedly and might cause service crash sometimes. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This Critical Patch resolves the issue. 1.2. Enhancements ==================================================================== The following enhancements are included in this Critical Patch: Enhancement 1: This Critical Patch upgrades the ActiveUpdate and CMAgent SDK module to remove some vulnerabilities. 1.3. Files Included in This Release ==================================================================== -------------------------------------------------------------------- Module File Name Build No. ----------------------------------------------------------------- 32-bit Normal Server AgentClient.dll 5.80.0.1618 Build.exe 2.86.0.1132 DCE.dll 5.80.0.1618 EventMsg2.dll 5.80.0.1618 LogDb.dll 5.80.0.1618 LogDbTool.dll 5.80.0.1618 LogMaster.dll 5.80.0.1618 LogViewer.exe 5.80.0.1618 Notification.dll 5.80.0.1618 NtApRPC.dll 5.80.0.1618 Patch.exe 2.86.0.1132 SP5NSLst.ini n/a SPCommonLog.dll 5.80.0.1618 SPLog.conf n/a SpntSvc.exe 5.80.0.1618 StCommon.dll 5.80.0.1618 StOPP.exe 5.80.0.1618 StRpcCln.dll 5.80.0.1618 StRpcSrv.dll 5.80.0.1618 StUpdate.exe 5.80.0.1618 TMNotify.dll 5.80.0.1618 TmOpp.dll 5.80.0.1618 TmUpdate.dll 2.86.0.1132 cert5.db n/a ciuas32.dll 0.0.2075 ciussi32.dll 0.0.2074 eng50.dll 5.80.0.1618 expapply.dll 4.2.0 expbuild.dll 4.2.0 icrcauapi.dll 2.83.0.1044 liblwtpciu32.dll 1.0.0.1005 log4cxx.dll 10.0.1 patchbld.dll 12.21 patchw32.dll 12.22 psmc.dll 8.42 spuninst.exe 5.80.0.1618 spuninstrc.dll 5.80.0.1618 tsc.exe 7.5.0.1178 x500.db n/a 64-bit Normal Server AgentClient.dll 5.80.0.1618 Build.exe 2.86.0.1132 DCE.dll 5.80.0.1618 EventMsg2.dll 5.80.0.1618 LogDb.dll 5.80.0.1618 LogDbTool.dll 5.80.0.1618 LogMaster.dll 5.80.0.1618 LogViewer.exe 5.80.0.1618 Notification.dll 5.80.0.1618 NtApRPC.dll 5.80.0.1618 Patch.exe 2.86.0.1132 SP5NSLst.ini n/a SPCommonLog.dll 5.80.0.1618 SPLog.conf n/a SpntSvc.exe 5.80.0.1618 StCommon.dll 5.80.0.1618 StOPP.exe 5.80.0.1618 StRpcCln.dll 5.80.0.1618 StRpcSrv.dll 5.80.0.1618 StUpdate.exe 5.80.0.1618 StUpdate_32.exe 5.80.0.1618 TMNotify.dll 5.80.0.1618 TmOpp.dll 5.80.0.1618 TmUpdate.dll 2.86.0.1132 cert5.db n/a ciuas32.dll 0.0.2075 ciussi32.dll 0.0.2074 eng50.dll 5.80.0.1618 expapply.dll 4.2.0 expbuild.dll 4.2.0 icrcauapi.dll 2.83.0.1044 liblwtpciu32.dll 1.0.0.1005 log4cxx.dll 10.0.1 patchbld.dll 12.21 patchw32.dll 12.22 psmc.dll 8.42 spuninst.exe 5.80.0.1618 spuninstrc.dll 5.80.0.1618 tsc.exe 7.5.0.1178 tsc64.exe 7.5.0.1178 x500.db n/a Information Server and Management Console Adm_enu.dll 5.80.0.1618 Admin.exe 5.80.0.1618 AgentClient.dll 5.80.0.1618 AgentClient.dll 5.80.0.1618 BIFSender.exe 5.80.0.1618 Build.exe 2.86.0.1132 EarthAgent.exe 5.80.0.1618 EventMsg2.dll 5.80.0.1618 GetRemoteVer.dll 5.80.0.1618 GetRemoteVer.dll 5.80.0.1618 ISSetup.dll 28.0.759 Notification.dll 5.80.0.1618 Patch.exe 2.86.0.1132 Quarantine.exe 5.80.0.1618 RemoteInstall.exe 5.80.0.1618 SP5NSLst.ini n/a SP5NSLst.ini n/a StCommon.dll 5.80.0.1618 StRpcCln.dll 5.80.0.1618 StUpdate.exe 5.80.0.1618 TMNotify.dll 5.80.0.1618 TmUpdate.dll 2.86.0.1132 cert5.db n/a ciuas32.dll 0.0.2075 ciussi32.dll 0.0.2074 data1.cab n/a data1.hdr n/a data2.cab n/a dce-exe-mssign-v75-1178.zip n/a dce-exe-mssign-x64-v75-1178.zip n/a expapply.dll 4.2.0 expbuild.dll 4.2.0 icrcauapi.dll 2.83.0.1044 libcrypto-3.dll 3.0.8 libcurl.dll 7.88.1 liblwtpciu32.dll 1.0.0.1005 libssl-3.dll 3.0.8 msvcr71.dll 7.10.3052.4 patchbld.dll 12.21 patchw32.dll 12.22 psmc.dll 8.42 setup.exe 5.8 setup.inx n/a spuninst.exe 5.80.0.1618 spuninst.exe 5.80.0.1618 spuninstrc.dll 5.80.0.1618 spuninstrc.dll 5.80.0.1618 tmcomm265-1020.zip n/a x500.db n/a zlibwapi.dll 1.2.11 MCP CMAgent CMAgent.exe 5.80.0.1618 CMAgentLog.dll 5.80.0.1618 En_BlobConvertUtility.dll 5.0.0.2621 En_I18N.dll 5.0.0.2621 En_Utility.dll 5.0.0.2621 MySplashScreen.dll 5.80.0.1618 ProductLibrary.dll 5.80.0.1618 ProductUI.zip n/a SSO_PKIHelper.dll 5.0.0.2621 TrendAprWrapperDll.dll 5.0.0.2621 cgiCmdNotify.exe 5.0.0.2621 libapr-1.dll 1.1.1 libcrypto-3.dll 3.0.8 libcurl.dll 7.88.1 libssl-3.dll 3.0.8 msvcr71.dll 7.10.3052.4 zlibwapi.dll 1.2.11 Patch Files License.txt n/a Readme.txt n/a TMPatch.exe 2.2.0.1057 UpdateComponent.cmd n/a hotfix.ini n/a setup.ini n/a 2. Documentation Set ======================================================================== To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com - Online Help: The Online Help contains an overview of features and key concepts, and information on configuring and maintaining the product. To access the Online Help, go to http://docs.trendmicro.com - Installation Guide (IG): The Installation Guide contains information on requirements and procedures for installing and deploying the product. - Administrator's Guide (AG): The Administrator's Guide contains an overview of features and key concepts, and information on configuring and maintaining the product. - Getting Started Guide (GSG): The Getting Started Guide contains product overview, installation planning, installation and configuration instructions, and basic information intended to get the product 'up and running'. - Support Portal: The Support Portal contains information on troubleshooting and resolving known issues. - To access the Support Portal, go to http://success.trendmicro.com 3. System Requirements ======================================================================== 1. Trend Micro ServerProtect for EMC Celerra 5.8 Patch2 Build 1443 - English - Windows - x32-x64 4. Installation ======================================================================== This section explains key steps for installing the Critical Patch. 4.1. Installing ==================================================================== To install: 1. Close the Management Console. 2. Run "spemc_580_win_en_criticalpatch_b1618.exe" to copy the Critical Patch files to the correct destination. The License Agreement appears. 3. Read the License Agreement and click "OK" if you agree with the license conditions to finish the installation. NOTES: - The setup will not continue if you do not agree to the setup license conditions. - The Critical Patch files are automatically deployed to all scan servers managed by the Information Server. To apply this Critical Patch to a Management Console that is not associated with the computer hosting the Information Server or is not installed in the same folder with the Information Server: 1. Apply the Critical Patch to the Information Server. 2. Close the Management Console. 3. Go to the Management Console home directory and backup the following files to another location. - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - EventMsg2.dll - spuninst.exe - spuninstrc.DLL 4. On the Information Server, copy the following files from the Information Server home directory to the Management Console home directory to overwrite the local files. - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - EventMsg2.dll - spuninst.exe - spuninstrc.DLL 4.2. Uninstalling ==================================================================== To roll back to the previous build: 1. On the Normal Server, run the following shell command to stop the Normal Server service: net stop spntsvc 2. On the Information Server, run the following shell command to stop the Trend Micro Management Communication Protocol (MCP) CMAgent service: net stop ServerProtectCMAgent 3. On the Information Server, run the following shell command to stop the Information Server service: net stop earthagent 4. If the Management Console is installed on the same server with the Information Server, open the Information Server's home directory and copy the files from the ".\backup\criticalpatch1618\filegroup10" folder to the current directory. If the Management Console is not installed on the same server with the Information Server, open the Management Console's home directory, and then roll back the following files: - admin.exe - Adm_enu.dll - AgentClient.dll - ADM_ENU.chm - EventMsg2.dll - spuninst.exe - spuninstrc.DLL 5. On the Normal Server, rename the backup files in the ServerProtect home directory and use them to replace the current files. The names of the backup files have ".bak" in the extension. 6. On the Information Server, open the Information Server's home directory and copy the files from the ".\backup\criticalpatch1618\filegroup100" folder to the ".\CMAgent" folder. 7. On the Information Server, open the Information Server's home directory and copy the files from the ".\backup\criticalpatch1618\filegroup10\" folder to the current directory. 8. On the Normal Server, run the following command to start the Normal Server service: net start spntsvc 9. On the Information Server, run the following command to start the MCP CMAgent service: net start ServerProtectCMAgent 10. On the Information Server, run the following command to start the Information Server service: net start earthagent 5. Post-installation Configuration ======================================================================== No post-installation steps are required. NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product. 6. Known Issues ======================================================================== There are no known issues for this Critical Patch release. 7. Release History ======================================================================== For more information about updates to this product, go to: http://www.trendmicro.com/download Prior Hotfixes ==================================================================== Only this Critical Patch was tested for this release. Prior hotfixes were tested at the time of their release. [Hotfix 1592] Issue 1: Sometimes, virus or spyware pattern update cannot succeed with error code 46 reported. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hotfix resolves the issue. Issue 2: If the sender or recipient address set for notifications exceeds 49 bytes, issues may occur: * The sender address will be truncated on the Management Console. * Notifications cannot be sent to the recipient successfully. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This hotfix resolves the issues. Issue 3: Some customers reported that they could not open the management console when port 1000 was occupied by other programs. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: This hotfix resolves this issue. Issue 4: The Normal Server may exit abnormally upon the failure to create the DCE engine process. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 4: This hotfix resolves this issue. Enhancement 1: This hotfix upgrades the ActiveUpdate module to remove some vulnerabilities. Enhancement 2: This hotfix upgrades the CMAgent SDK module to remove some vulnerabilities. [Critical Patch 1589] Issue 1: Sometimes, the Management Console stops unexpectedly when it receives certain illegal messages. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This Critical Patch resolves the issue by adding some validity checks to ensure that the Management Console can handle these messages. Issue 2: CMAgent sends incorrect operating system information to Trend Micro Control Manager(TM) when the current operating system is Microsoft(TM) Windows(TM) Server 2022. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This Critical Patch makes sure that CMAgent sends the correct operating system information to Control Manager. Enhancement 1: This Critical Patch resolves some vulnerabilities in the ServerProtect for EMC Celerra program. Enhancement 2: This Critical Patch removes some strings that contain password information from the debug log. Enhancement 3: This Critical Patch updates the error string in the Message Box that is triggered when an engine or pattern file update fails. [Critical Patch 1577] Issue 1: [SPNT JP Hotfix 1574]Sometimes, users cannot successfully add a freshly-installed Normal Server to an Information Server with a higher version. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This critical patch resolves this issue. Issue 2: [SPNT JP Hotfix 1574]Sometimes, when a pattern or engine update runs during a scheduled scan or manual scan, and fails, some related files remain locked. This can cause the Normal Server to stop responding. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This critical patch resolves this issue by enabling ServerProtect to release locked resources completely after a pattern or engine update fails. Enhancement 1: This critical patch removes some vulnerabilities from ServerProtect. [Critical Patch 1573] Issue 1: Sometimes, the spntsvc service stops unexpectedly. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This critical patch resolves the issue. [Critical Patch 1566] Issue 1: [SPFS Hotfix 1152 JP]Under certain conditions, a heap corruption issue triggers the Japanese version of ServerProtect to stop unexpectedly while its spntsvc service attempts to send an email notification. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This critical patch ensures that ServerProtect allocates enough memory to operate to prevent the heap corruption issue so it can send out email notifications normally. Issue 2: [SPNAF Hotfix 1242 EN]A protected computer may encounter blue screen of death (BSoD) when certain virus pattern operations are called at the same time. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This critical patch adds the RWLock feature for certain VSAPI functions to make sure that these APIs do not call virus patterns at the same time. Issue 3: [SPFS Hotfix 1169 EN]CMAgent stops responding when it receives certain abnormal commands. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 3: This critical patch enables CMAgent to handle abnormal commands. Issue 4: [SPFS Hotfix 1205 EN]The Message Box notifications have been disabled since Microsoft Windows Server 2008. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 4: This critical patch replaces the "NetMessageBufferSend" function with Windows Terminal Services (WTS) API to re-enable Message Box notifications on Windows Server 2008 and any later versions. Please refer to the following KB link for more details on how to use this feature: https://success.trendmicro.com/intkb/solution/112058 5 Issue 5: [SPFS Hotfix 1214 JP]Sometimes, the SPNTSVC process stops unexpectedly because of an invalid memory access issue in "tmnotify.dll". ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 5: This critical patch resolves the issue by preventing the invalid memory access issue. Issue 6: [SPFS Hotfix 1216 JP]Sometimes, the "Message-ID" column in notification email messages display duplicate message IDs. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 6: This critical patch resolves the issue by ensuring that ServerProtect generates and assigns unique message IDs. Issue 7: [SPFS Hotfix 1220 JP]ServerProtect cannot deploy pattern files if there is a "Program" file in the "C:" drive. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 7: This critical patch resolves the issue by ensuring that ServerProtect can deploy pattern files successfully. Issue 8: [SPFS Hotfix 1266 JP]Sometimes, a pattern or engine update fails when it runs while a scheduled scan or manual scan is running. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 8: This critical patch resolves this issue by optimizing the pattern lock logic that runs before the specific pattern is loaded. Issue 9: [SPNAF Service Pack 1 Patch 2 1281 EN]The Information Server version disappears from the management console after the Information Server restarts. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 9: This critical patch resolves this issue by enabling the management console to refresh the version information after the Information Server restarts. Issue 10: [SPNAF Service Pack 1 Patch 2 1281 EN]The Management Communication Protocol (MCP) CMAgent installation fails when the system checks the ServerProtect Information Server version. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 10: This critical patch resolves this issue by updating the version information of the "CMAgent.exe" function. Issue 11: The Tmcomm engine file "tmcomm.sys" is not updated in the system driver directory after a new Tmcomm engine version is deployed. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 11: This critical patch resolves this issue by ensuring that "tmcomm.sys" is copied to the system driver directory when the Tmcomm engine is updated. Issue 12: The Damage Cleanup Engine (DCE) is affected by certain vulnerabilities. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 12: This critical patch updates the DCE engine files to remove the vulnerabilities. Issue 13: The Tmcomm engine is affected by certain vulnerabilities. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 13: This critical patch updates the Tmcomm engine files to remove certain vulnerabilities. Issue 14: The Active Update module is affected by certain vulnerabilities. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 14: This critical patch updates the Active Update module to remove the vulnerabilities. Enhancement 1: [Critical Patch 1548 EN]This critical patch enables ServerProtect to use HTTPS for component updates by Active Update. Refer to the following KB for information on how to configure customized security options: https://success.trendmicro.com/solution/000253323 Enhancement 2: [SPFS Hotfix 1179 JP]This critical patch allows users to set the sleep time between scanning each folder during a manual scan or scheduled scan. Adjusting this time interval can help balance ServerProtect's CPU usage with its scan speed. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 2: To set the sleep time between scanning each folder during a manual scan or scheduled scan: 1. Install this critical patch (see "Installation"). 2. Open the Registry Editor on the Normal Server. 3. Add the following key and set the time interval in milliseconds. *Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ServerProte ct\CurrentVersion\SpntService *Key: ManualScanWaitTime *Type: DWORD *Value: The default value is "0", the unit is milliseconds 4. Restart the Normal Server service. Enhancement 3: [SPFS Patch 1 1194 EN]This critical patch enables ServerProtect to exclude processes during real-time scans. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 3: To configure the Exclude Process List: 1. Install this critical patch (see "Installation"). 2. Open the Registry Editor. 3. Add the following key: *Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ServerProte ct\CurrentVersion\Engine\Exception *Key: ProcessList *Type: Multi-String Value *Value: specify the process full path to this ProcessList Enhancement 4: [SPFS Hotfix 1214 JP]This critical patch enables the Information Server to verify the version information of any Management Console that attempts to connect to it. This helps ensure that the correct Management Console version connects to the Information Server. NOTE: If your Management Console is not installed in the same path as the Information Server, please refer to specific hotfix readme for steps to replace files for the Management Console. Enhancement 5: [SPFS Hotfix 1214 JP]This critical patch enables the Information Server to display its version information in the Management Console middle tree control list by default. NOTE: The Management Console will be able to connect only to an Information Server with the same version. Enhancement 6: [SPFS Hotfix 1224 JP]This critical patch adds an alert log for instances when the last manual scan or task scan did not complete normally. Enhancement 7: [SPNAF Hotfix 1269 EN]This critical patch enables the Normal Server to generate scan fail logs for Manual/Scheduled Scan and Real-time Scan. Enhancement 8: [SPNAF Service Pack 1 Patch 2 1281 EN]This critical patch enables the network send/receive timeout configuration for ActiveUpdate. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 8: To configure this feature: 1. Install this critical patch (see "Installation"). 2. Open the Registry Editor. 3. Add the following key in Information Server: *32-bit OS: *Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ServerProte ct\CurrentVersion\InformationServer *64-bit OS: *Path: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TrendMicro \ServerProtect\CurrentVersion\InformationServer *Key: AUNetworkTimeout *Type: String(REG_SZ) *Value: timeout value (Seconds) Enhancement 9: [SPNAF Service Pack 1 Patch 2 1281 EN]This patch enables the network connection timeout configuration for ActiveUpdate. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 9: To configure this feature: 1. Install this critical patch (see "Installation"). 2. Open the Registry Editor. 3. Add the following key in the Information Server: *32-bit OS: *Path: HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\ServerProte ct\CurrentVersion\InformationServer *64-bit OS: *Path: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TrendMicro \ServerProtect\CurrentVersion\InformationServer *Key: AUConnectTimeout *Type: String(REG_SZ) *Value: timeout value (Seconds) [Critical Patch 1539] Issue 1: A silent installation may fail if administrators install ServerProtect using a Repack 3 package. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This critical patch ensures that a silent installation succeeds in this situation. [Critical Patch 1516] Enhancement 1: This critical patch adds a special antivirus program compatibility registry key to the Normal Server and Information Server. Microsoft checks for this special registry key value on the computer before running the next Security Update for Windows(TM). Microsoft KB4056892 was released in January 4, 2018 and requires the new registry key installed before you can apply the update. For more information about Microsoft KB4056892, refer to the following link: https://support.microsoft.com/en-us/help/4056892/w indows-10-update-kb4056892 This registry is created automatically each time spntsvc restarts even after this key has been deleted. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Procedure 1: To disable this behavior: a. Install this critical patch (see "Installation"). b. Open the Registry Editor. c. Add the following key: Key="HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\Server Protect\CurrentVersion\SpntService" Name="DisableSUVPCompat" Type="REG_DWORD" Value="0x00000001" [Hotfix 1492] Issue 1: When ServerProtect 5.8 for EMC Celerra English version Patch 2 is installed on Microsoft Windows Server 2016, the Management Console shows an incorrect platform version number. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hotfix enhances the support for Microsoft Windows Server 2016, and ensures the platform version number shown in the Management Console is consistent with the actual platform version number. Issue 2: When ServerProtect 5.8 for EMC Celerra English version Patch 2 is installed on Microsoft Windows Server 2016 and registered to Control Manager, Control Manager shows an incorrect operating system (OS) version number. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 2: This hotfix ensures that the OS version shown in Control Manager is consistent with the actual OS version. [Hotfix 1488] Enhancement 1: This hotfix enables ServerProtect to display the long virus names instead of the short virus names to provide users with more accurate information. [Hotfix 1460] Issue 1: The ServerProtect Normal Server may stop unexpectedly when users stop a manual scan through the Management Console. This happens because under this scenario, the ServerProtect Normal Server may attempt to access a memory resource that has just been released from the manual scan. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hot fix ensures that ServerProtect releases memory resources properly when terminating a manual scan. [Hotfix 1458] Issue 1: The image path for the ServerProtect CMAgent service is not enclosed in quotation marks. This may trigger a CWE-428 issue that can prevent the CMAgent service from starting. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution 1: This hot fix enables ServerProtect to check if the image path of its CMAgent is enclosed in quotation marks and to add these to the path when necessary. This hot fix also ensures that ServerProtect uses quotation marks to enclose the image path of the CMAgent during CMAgent installation. 8. Contact Information ======================================================================== A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees. Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products. https://www.trendmicro.com/en_us/contact.html NOTE: This information is subject to change without notice. 9. About Trend Micro ======================================================================== Smart, simple, security that fits. As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. Copyright 2023, Trend Micro Incorporated. All rights reserved. Trend Micro, the t-ball logo, OfficeScan, Trend Micro Security (for Mac), Control Manager, Trend Micro Apex One, and Trend Micro Apex Central are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other product or company names may be trademarks or registered trademarks of their owners. 10. License Agreement ======================================================================== View information about your license agreement with Trend Micro at: https://www.trendmicro.com/en_us/about/legal.html Third-party licensing agreements can be viewed: - By selecting the "About" option in the application user interface - By referring to the "Legal" page of the Administrator's Guide