Set up an email message that instructs users on the network to install the Security Agent. Users click the Security Agent installer link provided in the email to start the installation.
Before you install Security Agents:
Check the Security Agent installation requirements.
Identify which computers on the network currently do not have protection against security risks. Perform the following tasks:
Run the \Trend Micro Vulnerability Scanner. This tool analyzes endpoints for installed antivirus software based on an IP address range you specify.
For more information, see Vulnerability Scanner Usage.
Run Security Compliance.
For more information, see Security Compliance for Unmanaged Endpoints.