Trend Micro, Inc.

July 2025

Trend Micro Apex One™ (Mac) Patch 17

 

This readme file is current as of the date above. However, all customers are advised to check Trend Micro's website for documentation updates at https://docs.trendmicro.com/en-us/documentation/apex-one-%EF%BC%88mac%EF%BC%89/.

 

Contents


  1. About Apex One (Mac)
  2. What's New
  3. Document Set
  4. System Requirements
  5. Installation
  6. Post-installation Configuration
  7. Known Issues
  8. Contact Information
  9. About Trend Micro
  10. License Agreement


1. About Apex One (Mac)


Apex One (Mac) provides the latest endpoint protection against security risks, blended threats, and platform independent web-based attacks.

The Apex One (Mac) server is a plug-in program integrated with Trend Micro products such as Apex One and Worry-free Business Security and installed through the Plug-in Manager framework. The Apex One (Mac) server deploys Security Agents to Mac computers.

Back to top



2. What's New


The following enhancements are included in this release:

Enhancement 1: This patch updates the iCore module in Trend Micro Apex One (Mac) Security Agent to enhance detection actions for spyware.
Enhancement 2: This patch updates the Advanced Threat Scan Engine (ATSE) in Trend Micro Apex One (Mac) Security Agent to enhance product integration.
Enhancement 3: This patch updates the Apex One (Mac) Server to prevent potential Cross-Site Scripting (XSS) vulnerability attacks.
Enhancement 4: This patch enhances the log collection capability of Trend Micro Debug Manager by updating the Trend Micro Apex One (Mac) Security Agent.
Enhancement 5: This patch enables Trend Micro Apex One (Mac) to send real-time scan status to Trend Micro Apex Central.
Enhancement 6: This patch updates the iCore module in Trend Micro Apex One (Mac) Security Agent to support the millisecond format in detection logs.
Enhancement 7: This patch updates the iCore module in Trend Micro Apex One (Mac) Security Agent to enhance product performance.

Back to top

Files Changed in this Release

Filename Build Number

------------------------------

---------------

TMSM

--------------------------------------------------------------------

libAoSSrvWrapper.dll

3.5.8033

libWebSvcWrapper.dll

3.5.8033

PolicyExportTool.exe

3.5.8033

ResCommon.dll

3.5.8033

ServerInfoTool.exe

3.5.8033

TMSM_AoSSrvPlugin.dll

3.5.8033

TMSMAzureStorage.exe

3.5.8033

TMSMCommon.dll

3.5.8033

TMSMCore.dll

3.5.8033

TMSMDBTool.exe

3.5.8033

TMSMMainService.exe

3.5.8033

TMSMSetupTool.exe

3.5.8033

TMSMSQLSetupUtility.dll

3.5.8033

TMSMUninstall.exe

3.5.8033

TMSMUtilTool.exe

3.5.8033

TMSM\Web\TMSMClientChannel\bin

--------------------------------------------------------------------

TMSMBasicModel.dll

3.5.8033

TMSMClientChannel.dll

3.5.8033

TMSMCommon.dll

3.5.8033

TMSM\Web\TMSMConsoleChannel\bin

--------------------------------------------------------------------

TMSMBasicModel.dll

3.5.8033

TMSMConsoleChannel.dll

3.5.8033

TMSMCommon.dll

3.5.8033

 

Back to top

 

3. Document Set


The documentation set for Apex One (Mac) includes the following:

View and download product documentation at:

https://docs.trendmicro.com/en-us/documentation/apex-one-%EF%BC%88mac%EF%BC%89/

Back to top



4. System Requirements


Visit the following web pages:

 

Back to top



5. Installation


Important: Before installing or upgrading to Apex One (Mac) Patch 2 and above on the server, make sure that the certificate is not expired for Microsoft Internet Information Services (IIS).

Visit the following web pages:

Note: To deploy the Security Agent using a mobile device management (MDM) profile, configure the required settings as stated on https://success.trendmicro.com/en-US/solution/KA-0011072/.

 

Back to top



6. Post-installation Configuration


Visit the following web pages:

 

Back to top



7. Known Issues


7.1 Limitation When Configuring Scan Time Machine for Manual and Scheduled Scan

Problem: After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions display as unsuccessful in the product logs.

7.2 Endpoint Sensor Processing Limitation

Problem: Endpoint Sensor processing of files on Mac endpoints is case insensitive. Historical investigation results on the Apex Central console include all entries for a file name with different capitalization.

7.3 File Name Changes in Historical Investigation

Problem: When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a slash (/) with a colon (:) in file names, preventing users from searching for file names that contain slashes in investigation results.

Workaround: To resolve this issue, use a colon (:) to search for files.

 

Back to top


8. Contact Information


A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.

You can contact Trend Micro via fax, phone, and email, or visit us at http://www.trendmicro.com.

Evaluation copies of Trend Micro products can be downloaded from our website.

Global Mailing Address/Telephone numbers

For global contact information in the Asia/Pacific region, Australia and New Zealand, Europe, Latin America, and Canada, refer to http://www.trendmicro.com.

The Trend Micro "About Us" screen displays. Click the appropriate link in the "Contact Us" section of the screen.

Note: This information is subject to change without notice.

Back to top



9. About Trend Micro


Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. A pioneer in server-based antivirus with over 20 years experience, we deliver top-ranked security that fits our customers' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology and products stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit http://www.trendmicro.com.

Copyright 2025, Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Apex One, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Back to top


10. License Agreement


Information about your license agreement with Trend Micro can be viewed at http://us.trendmicro.com/us/about/company/user_license_agreements/.

Third-party licensing information can be viewed from the About page on the Apex One (Mac) web console.

Back to top