ServerProtect for Microsoft Windows/Novell NetWare

End-of-Life plan and Migration guide for Trend Micro™ ServerProtect™ Windows Products
EOL Plan Support for the following products will end.It is recommended that customers migrate to ServerProtect for Storage (SPFS) 6.0 Patch 3. Until the end-of-life date, Trend Micro Technical Support will provide best-effort support for any issues found in the listed products. However, since the common modules (such as the MCP Agent SDK module or the AU module) used by the listed products are no longer supported, if a fix requires upgrading these common modules, no fix will be released for the listed products. Customers will need to migrate the products. ProductLanguageEnd of Life PlanServerProtect for Network Appliance Filer 5.8EnglishJune 30, 2026ServerProtect for Microsoft Windows/Novell Netware 5.8EnglishDecember 31, 2026ServerProtect for EMC Celerra 5.8EnglishDecember 31, 2026
Microsoft Defender and ServerProtect compatibility
Running ServerProtect and Microsoft Defender on the same machine may lead to the following:         • Virus detection failure        • Application lockup        • Machine performance issueYou may refer to this documentation for updated Microsoft Window's Compatibility to 3rd party Antivirus. Recommended settings are indicated as well.Should there be compatibility issues with Microsoft Defender and ServerProtect, Trend Micro recommends deactivating Microsoft Defender to lessen resource consumption for your endpoints. This also ensures that ServerProtect's security features work in optimal condition by eliminating potential conflicts with Microsoft Defender
Unvalidated root certificate may cause update failure in ServerProtect IS/NS servers
ServerProtect IS/NS server machines which do not have these certificates may encounter update issues.To view the symptom:Open the ServerProtect install path. As an example, C:\Program Files\Trend\SProtect.Right-click one binary property such as AgentClient.dll.Click Details for the digital signature. Under the Digital Signature Information, the following error can be found, "The certificate in the signature cannot be verified". This issue occurs when ServerProtect is installed on a Windows machine (Windows server 2008/2012) without direct Internet connection for downloading certificate updates.
ServerProtect for Microsoft Windows (SPNT) 5.8 Critical Patch Build 1548 is now available
ServerProtect for Microsoft Windows 5.8 Critical Patch Build 1548 release is now available in the Download Center.
Changing the scheduled time frequency of Trend Micro ServerProtect for Storage when upgrading to VSAPI engine 12.200.1020
After upgrading Virus Scan Engine to 12.200.1020, the Normal Server may restart every time a scheduled deployment or manual deployment tries to deploy Virus Scan Engine.
Understanding the Test Connection function in ServerProtect for Microsoft Windows/Novell Netware (SPNT)
The Test Connection function still uses the Transport Layer Security (TLS) 1.0 default setting to do the action with Control Manager (TMCM) in the CMAgent Setting page. Use https to do this test if you want to disable TLS 1.0 and only enable TLS 1.2.
Release schedule and new features of Damage Cleanup Engine (DCE) 7.3 ActiveUpdate
The Damage Cleanup Engine (DCE) uses a predefined cleanup template to remove files, registry entries, and other system changes made by a detected malware. The DCE 7.3 is available for download on the ActiveUpdate (AU) starting on September 11, 2014 (GMT+8).To have a more efficient deployment, DCE will be released in phases depending on the product and version. Know the schedule of release of DCE on your product.
SECURITY BULLETIN: Installer Vulnerability in Multiple Trend Micro Products
Release Date: February 19, 2020CVE Identifier(s): CVE-2019-14688 Platform(s): WindowsSeverity Rating(s): MediumTrend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation.
Important Information for Trend Micro Solutions and Microsoft January 2018 Security Updates (Meltdown and Spectre)
Last updated: August 28, 2018 Information has recently been released about a set of vulnerabilities commonly referred to as Meltdown and Spectre that could be exploited at a hardware (CPU) layer on multiple operating systems including Microsoft Windows, Linux, and Apple macOS.   There are a few important pieces to note for Trend Micro customers:These are not vulnerabilities in Trend Micro products.Microsoft began issuing out-of-band security patches, starting on January 3, 2018, for Windows platforms and is requiring its customers to check compatibility with anti-malware products before installing this patch.Trend Micro's endpoint and security products listed below are compatible with Microsoft's January 2018 security patches.It is highly recommended that customers test any patch or solution mentioned in a non-production environment first before a wider deployment.At this time, there are no known in-the-wild exploits of either the Meltdown or Spectre vulnerabilities; however, there is a POC remote exploit for Spectre.  Trend Micro has released some out-of-band protection updates for this.Please read further for more information.  Looking for information on consumer Trend Micro Security products? Please click here for more information. 
Collecting Log Dumps when System and Applications encounter hang and crash issues
In some cases, we need dumps to know the cause of performance issues hang and crash issues.This article will provide the general steps on collecting log dumps for different scenarios.
0 of rows(s) selected.
Page 1 of 11
Latest in Downloads
View all Downloads
Related Documentation
View all Documents