Feature Requirements

The following table lists the features available with the Connected Threat Defense architecture and the required and optional products that integrate with each.

Feature

Required Products

Optional Products

Security threat monitoring

  • Control Manager 7.0 (or later)

  • Deep Discovery Inspector 3.8 (or later) or Deep Discovery Analyzer 5.1 (or later)

Note:

At least one optional product is required to evaluate log data.

  • OfficeScan 11.0 SP1 (or later)

  • Deep Security 10.0 (or later)

  • Endpoint Sensor 1.5 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • ScanMail for Microsoft Exchange 12.5 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

Suspicious Object list synchronization

For more information, see Suspicious Object Lists and Connected Threat Defense Product Integration.

  • Control Manager 7.0 (or later)

  • Deep Discovery Inspector 3.8 (or later) or Deep Discovery Analyzer 5.1 (or later)

Note:

At least one optional product is required for synchronization.

  • Smart Protection Server 3.0 Patch 1 (or later)

  • OfficeScan 11.0 SP1 (or later)

  • Deep Security 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

Suspicious Object sample submission

  • Deep Discovery Inspector 3.8 (or later) or Deep Discovery Analyzer 5.1 (or later)

  • Deep Security 10.0 (or later)

  • OfficeScan 11.0 SP1 (or later)

  • Endpoint Sensor 1.5 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • ScanMail for Microsoft Exchange 12.5 (or later)

  • Deep Discovery Email Inspector 3.0 (or later)

Suspicious Object management

  • Control Manager 7.0 (or later)

  • Deep Discovery Inspector 3.8 (or later) or Deep Discovery Analyzer 5.1 (or later)

  • OfficeScan 11.0 SP1 (or later)

  • Deep Security 10.0 (or later)

  • Endpoint Sensor 1.5 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

Suspicious Object scan actions

For more information, see Suspicious Object Scan Actions.

  • Control Manager 7.0 (or later)

  • Smart Protection Server 3.0 Patch 1 (or later)

  • OfficeScan 11.0 SP1 (or later)

  • Deep Security 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

Impact assessment

  • Control Manager 7.0 (or later)

  • Endpoint Sensor 1.5 (or later)

  • None

Endpoint isolation

For more information, see Isolating Endpoints.

  • Control Manager 7.0 (or later)

  • OfficeScan 11.0 SP1 (or later)

  • Endpoint Sensor 1.5 (or later)

IOC management

  • Control Manager 7.0 (or later)

  • Endpoint Sensor 1.5 (or later)

  • None