<> Trend Micro Incorporated December 18, 2018 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro Application Control Hash Generation Tool ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ TERMS AND CONDITIONS: This tool was developed by Trend Micro, Inc. This tool has received limited testing and is for your internal use only. THIS TOOL IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND. TREND MICRO MAKES NO WARRANTY ABOUT THE OPERATION OR PERFORMANCE OF THIS TOOL NOR DOES IT WARRANT THAT THIS TOOL IS ERROR FREE. TO THE FULLEST EXTENT PERMITTED BY LAW, TREND MICRO DISCLAIMS ALL IMPLIED AND STATUTORY WARRANTIES, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE. THIS TOOL IS SUBJECT TO CHANGE AND MODIFICATION, INCLUDING, WITHOUT LIMITATION, CHANGES AND MODIFICATIONS WITH RESPECT TO PERFORMANCE AND FUNCTIONALITY ANY TIME AT THE SOLE DISCRETION OF TREND MICRO. Contents ========================================================== 1. Overview of This Tool 2. How to Use the Tool 3. Documentation Set 4. System Requirements 5. Installation 5.1 Installing 5.2 Uninstalling 6. Post-Installation Configuration 7. Release History 8. Contact Information 9. About Trend Micro 10. License Agreement ========================================================== 1. Overview of This Tool ======================================================================== The Hash Generation Tool calculates the SHA-256 hash value of portable executable (PE) files on an endpoint and saves the values to a CSV file. You can manually import the generated CSV file to the Apex Central console for use as Application Control Criteria in the Security Agent policy settings. 2. How to Use the Tool ======================================================================== 1. Save the TMiACHashGen.exe file on the target endpoint. 2. Open a command line editor. 3. Change to the directory where you saved the TMiACHashGen.exe file. 4. Type the following command: TMiACHashGen.exe - [] Options: -o: output directory (default: working directory) -n: output file name (default: timestamp) -d: scan entry directory (default: all hard disks) Examples: Default command with no options: TMiACHashGen.exe Output file: \1545015023.csv Command that indicates a specific output directory, output file name, and only performs the hash value calculations on files in a specific directory on the endpoint: TMiACHashGen.exe -o "c:\testDir" -n testFileName -d "c:\desktop" Output file: c:\testDir\testFileName.csv 5. Press ENTER. Note: The Hash Generation Tool creates the CSV file in the directory specified. 3. Documentation Set ======================================================================== To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com To access the Support Portal, go to http://esupport.trendmicro.com 4. System Requirements ======================================================================== No special requirements for installing this tool. 5. Installation ======================================================================== No special instructions are provided. 5.1 Installing ===================================================================== No special installation instructions are provided. 5.2 Uninstalling ===================================================================== No special uninstallation instructions are provided. 6. Post-Installation Configuration ======================================================================== No post-installation steps are required. 7. Release History ======================================================================== For more information about updates to this product, go to: http://www.trendmicro.com/download This is the first release. 8. Contact Information ======================================================================== A license to Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, you must renew Maintenance on an annual basis at Trend Micro's then-current Maintenance fees. Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products. http://www.trendmicro.com/us/about-us/contact/index.html NOTE: This information is subject to change without notice. 9. About Trend Micro ======================================================================== Smart, simple, security that fits As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. Copyright 2018, Trend Micro Incorporated. All rights reserved. Trend Micro, Apex One, Apex Central, and the t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. 10. License Agreement ======================================================================== View information about your license agreement with Trend Micro at: www.trendmicro.com/us/about-us/legal-policies/license-agreements