Home Security System User Manual
Using the Trend Micro Dashboard
4-9
Table 4-1 lists suggested corrective actions when vulnerabilities are found.
TABLE 4-1. Vulnerabilities checked by Security Scan
What Security Scan Does Corrective Action
Microsoft vulnerabilities Checks if known Microsoft
vulnerabilities exist on your
system
Visit the Microsoft Windows
TM
update site to download
updates.
Trojan horse programs Scans and detects Trojans To remove Trojans, install
Trend Micro Internet Security.
Spyware Detects spyware and gives you
the option to remove it
Use Anti-Spyware to remove
spyware found by Security
Scan. For real-time and
scheduled spyware scanning,
install Trend Micro Internet
Security.
File sharing Detects shared folders on your
computer
Remove or restrict sharing
permissions. To disable folder
sharing, right-click the folder
in Windows Explorer, click
Properties, and then click
Sharing. In Windows 2000
and XP, click Do not share
this folder. In Windows 98
and ME, click Not Shared.
Security software Checks if you have installed
well-known virus protection
software, and how recently it
has been updated
If you do not have virus
protection software, or if your
software is out of date, install
Trend Micro Internet Security.










