Welcome to the Trend Micro TrendEdge Solutions Web Site
Innovative techniques, tools, and best practices for Trend Micro products
What’s NewHere are the most-recent solutions added to the site:
Deploying Trend Micro InterScan Messaging Security Virtual Appliance in a Non-Production Environment (PDF)
by Jason PappalexisThis document summarizes the steps required to install and configure InterScan Messaging Security Virtual Appliance 8.2 (IMSVA) in a non-production environment for the purpose of transferring mail and demonstrating/evaluating functionality.
Using Mandatory Transport Layer Security Per Domain in InterScan Messaging Security Virtual Appliance 8.2: A Case Study (PDF)
by Jason Pappalexis, Sean StoutmeyerThis document describes how to use the Postfix command line to set up mandatory Transport Layer Security (TLS) in Trend Micro InterScan Messaging Security Virtual Appliance 8.2 (IMSVA) for use by one set of SMTP domains, and by default, use opportunistic TLS for all others.
Installing Trend Micro SecureCloud On-Premise 2.0 for Windows Server 2008 (PDF)
by Andy LuxThis document describes how to install and configure the Trend Micro SecureCloud 2.0 On-Premise Key Management Server on a system running Windows Server 2008.
Optimizing the Performance of the Trend Micro OfficeScan 10.6 Virtual Desktop Infrastructure (PDF)
by Chris Pratico
This document describes methods of protecting Trend Micro OfficeScan 10.6 client virtual machines that you manage through the optional OfficeScan 10.6 Virtual Desktop Infrastructure (VDI) plug-in.
Recovering an Encrypted Trend Micro SecureCloud 1.2 Disk from a Virtual Machine Incapable of Booting (PDF)
by Andy LuxThis document provides instructions on how to move a VMware VMDK (or virtual hard disk) encrypted with Trend Micro SecureCloud 1.2 from one virtual machine (VM) to another in a VMware vCenter environment.
Trend Micro supports some of the publications and tools on this Web site. Others it does not. Some are products of the extended Trend Micro community, and the individuals who post to this site may or may not be formally affiliated with Trend Micro. Trend Micro provides these "as-is" products as a courtesy to interested parties, and the accuracy of the information is solely the author’s responsibility. Neither Trend Micro nor its partners support these "as-is" products in any way.
If the status of a document is a concern, customers should take the appropriate care when downloading or using products from this Web site. Trend Micro indicates whether a product is unsupported by placing a note in a prominent position on the first page of the document's text. Trend Micro supports all publications that do not have this note.