ServerProtect For EMC Celerra

End-of-Life plan and Migration guide for Trend Micro™ ServerProtect™ Windows Products
EOL Plan Support for the following products will end.It is recommended that customers migrate to ServerProtect for Storage (SPFS) 6.0 Patch 3. Until the end-of-life date, Trend Micro Technical Support will provide best-effort support for any issues found in the listed products. However, since the common modules (such as the MCP Agent SDK module or the AU module) used by the listed products are no longer supported, if a fix requires upgrading these common modules, no fix will be released for the listed products. Customers will need to migrate the products. ProductLanguageEnd of Life PlanServerProtect for Network Appliance Filer 5.8EnglishJune 30, 2026ServerProtect for Microsoft Windows/Novell Netware 5.8EnglishDecember 31, 2026ServerProtect for EMC Celerra 5.8EnglishDecember 31, 2026
Microsoft Defender and ServerProtect compatibility
Running ServerProtect and Microsoft Defender on the same machine may lead to the following:         • Virus detection failure        • Application lockup        • Machine performance issueYou may refer to this documentation for updated Microsoft Window's Compatibility to 3rd party Antivirus. Recommended settings are indicated as well.Should there be compatibility issues with Microsoft Defender and ServerProtect, Trend Micro recommends deactivating Microsoft Defender to lessen resource consumption for your endpoints. This also ensures that ServerProtect's security features work in optimal condition by eliminating potential conflicts with Microsoft Defender
Changing the scheduled time frequency of Trend Micro ServerProtect for Storage when upgrading to VSAPI engine 12.200.1020
After upgrading Virus Scan Engine to 12.200.1020, the Normal Server may restart every time a scheduled deployment or manual deployment tries to deploy Virus Scan Engine.
Release schedule and new features of Damage Cleanup Engine (DCE) 7.3 ActiveUpdate
The Damage Cleanup Engine (DCE) uses a predefined cleanup template to remove files, registry entries, and other system changes made by a detected malware. The DCE 7.3 is available for download on the ActiveUpdate (AU) starting on September 11, 2014 (GMT+8).To have a more efficient deployment, DCE will be released in phases depending on the product and version. Know the schedule of release of DCE on your product.
ServerProtect stops supporting information for SHA1 code signing
Trend Micro stopped supporting SHA1 code signing for security concerns. ServerProtect products will only continue to support SHA2 code signing. For systems which do not support SHA2 code signing, it may have impact.Affected OS:Windows 2008 without SHA2 Code Signing support updateWindows 2008 R2 without SHA2 Code Signing support updateConsider the following impacted scenario:ScenarioImpacted ProductVirus Cleanup Template version shows as 0 on the impacted OS, Virus Cleanup Engine cannot initial successfully due to failed SHA2 Code Signing verification. Windows SP series which applies to Virus Cleanup Engine 7.5.1178NS service fails to start with error code 1068 when installing SPFS or after VSAPI engine updates to 21.600.1005.Windows SP series which applies to VSAPI engine 21.600.1005Pattern/engine update fails after upgrading AU module to 2.86.0.1126 and above.Windows SP series which use AU module 2.86.0.1126 and above
CRITICAL SECURITY BULLETIN: Multiple Vulnerabilities in Trend Micro ServerProtect - February 2022
Release Date: February 22, 2022CVE Identifier(s): CVE-2022-25329 through CVE-2022-25331Platform(s): Windows, Network Appliance, EMC CelerraCVSS 3.0 Score(s): 6.5 - 9.8Severity Rating(s): Medium - CriticalTrend Micro has released new Critical Patches for Trend Micro ServerProtect that resolves several vulnerabilities related to a static credential, integer overflow and denial-of-service (DoS).
CRITICAL SECURITY BULLETIN: Trend Micro ServerProtect Authentication Bypass Vulnerability
Release Date: September 24, 2021CVE Identifier(s): CVE-2021-36745Platform(s): MultipleCVSS 3.0 Score(s): 9.8Severity Rating(s): CriticalTrend Micro has released new Critical Patches (CPs) for Trend Micro ServerProtect. These patches resolve a critical authentication bypass vulnerability.
Manually updating the pattern file on ServerProtect
Manually update the pattern file on the ServerProtect Information Server. After the update, you will be able to deploy it to all Normal Server(s).
Trend Micro ServerProtect fails to add a freshly installed Normal Sever (NS) to the Information Server (IS) with a higher version
ProductAffected Build VersionPlatformServerProtect for Storage (SPFS) 6.0 SPFS EN Hot fix B1218SPFS JP Hot fix B1214 Windows Server 2008 or LaterServerProtect for Netware (SPNT) 5.8 SPNT EN Patch 5 B1567SPNT JP Patch 7 B1570 ServerProtect for Network Appliance Filer (SPNAF) 5.8 SPNAF EN SP 1 Patch 2 B1281SPNAF JP SP 1 Patch 2 B1287 ServerProtect for EMC Celerra (SPEMC) 5.8 SPEMC EN Critical Patch B1566 A freshly installed Normal Server (GM build) cannot be added to an Information Server with a newer version. It only occurs in the Information Server with the feature of version verification between Management Console and Information Server, such as SPNT JP Patch 7 and EN Patch 5. The following error will be displayed.
Deploying virus pattern files and DCT to ServerProtect Normal Server using hot fix deployment method
Using the hox fix deployment method, ServerProtect can deploy the latest virus pattern files and Damage Cleanup Template (DCT) to the ServerProtect Normal Server.
0 of rows(s) selected.
Page 1 of 4
Latest in Downloads
View all Downloads
Related Documentation
View all Documents