Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Using the Rescue Disk feature of Portable Security

    • Updated:
    • 26 Feb 2020
    • Product/Version:
    • Portable Security 3.0
    • Platform:
Summary

Use the Trend Micro Rescue Disk to examine your endpoint without launching your operating systems. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system.

Rescue Disk can scan hidden files, system drivers, and the Master Boot Record (MBR) of your endpoint’s hard drive without disturbing the operating system. Rescue Disk does not load potentially-infected system files into memory before trying to remove them.

Take note that by default, Trend Micro Rescue Disk quarantines any detected threats to the local hard drive. If you wish to scan without writing any information to your local hard drive, change the scan action settings to Scan only.

Details
Public

Rescue Disk supports the following file systems:

Operating SystemFile System
WindowsNTFS and FAT
LinuxEXT, EXT2, EXT3, EXT4 and XFS

Note: Rescue Disk runs on any Linux distribution installed on a supported file system.

Follow these steps:

Preparation

  1. Insert the USB device into the endpoint.
  2. Restart the endpoint.
  3. When the endpoint powers up, open the BIOS or UEFI Setup Utility.
  4. Look for Boot, Boot Order, or Boot Options in the menu, and change the First Boot Device to the USB device.
  5. Exit the menu. Trend Micro Rescue Disk will automatically open after restarting.

Using the Rescue Disk

 
The confirmation message only appears if you have configured the Rescue Disk to:
  • Scan and quarantine objects
  • Inform users before the quarantine starts
  1. After you have restarted the endpoint, the Trend Micro Rescue Disk console opens automatically.
  2. Press ENTER, or wait for a short while. The Confirm Disk Log window appears.
  3. Select Yes. The Choose Action window appears.
  4. Select [1] Scan for Security Threats, and then select the type of scan:
    • [1] Quick Scan: Scans only the folders most vulnerable to system threats (such as the Windows System folder)
    • [2] Full Scan: Scan all folders.

    The Rescue Disk automatically starts scanning, and you must wait for the scan to finish.

     
    The confirmation message only appears if you have configured the Rescue Disk to:
    • Scan and quarantine objects
    • Inform users before the quarantine starts
  5. If any threats are detected, the message "Are you sure you want to resolve these objects?" appears. Select Yes to remove threats.
  6. After scan logs are saved to the Scanning Tool, confirm the removal of the Scanning Tool from the endpoint.
  7. Press ENTER to restart the endpoint.
Premium
Internal
Partner
Rating:
Category:
Configure
Solution Id:
000244634
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.