| 
                              
                               Component 
                              
                            | 
                           
                              
                               Description 
                              
                            | 
                        
|---|---|
| 
                              
                               Advanced Threat Correlation Pattern 
                              
                            | 
                           
                              
                               The Advanced Threat Correlation Pattern contains a list of file
                                 features that are not relevant to any known threats.
                               
                              
                            | 
                        
| 
                              
                              
                              
                               for Deep Discovery (Linux, 64-bit) 
                              
                            | 
                           
                              
                               The Advanced Threat Scan Engine protects against viruses, malware, and exploits to
                                 vulnerabilities in software such as Java and Flash. Integrated with the Trend Micro Virus Scan Engine, the Advanced Threat Scan Engine employs signature-based, behavior-based,
                                 and aggressive heuristic detection.
                               
                              
                            | 
                        
| 
                               Contextual Intelligence Query Handler  (Linux, 64-bit)
                            | 
                           
                              
                               The Contextual Intelligence Query Handler processes the
                                 behaviors identified by the Contextual Intelligence Engine and sends the report to
                                 the Predictive Machine Learning engine.
                               
                              
                            | 
                        
| 
                              
                               The Deep Discovery Malware Pattern contains information
                                 that helps Deep Discovery Analyzer
                                 identify the latest malware and mixed threat attacks. Trend Micro creates and releases new
                                 versions of the pattern several times a week, and any time after the discovery of
                                 a particularly damaging virus/malware.
                               
                              
                            | 
                        |
| 
                              
                               The IntelliTrap Exception Pattern contains detection
                                 routines for safe compressed executable (packed) files to reduce the amount of
                                 false positives during IntelliTrap scanning.
                               
                              
                            | 
                        |
| 
                              
                               The IntelliTrap Pattern contains the detection routines
                                 for compressed executable (packed) file types that are known to commonly obfuscate
                                 malware and other potential threats.
                               
                              
                            | 
                        |
| 
                              
                               The Network Content Correlation Pattern implements detection rules defined by Trend Micro.
                               
                              
                            | 
                        |
| 
                              
                              
                              
                               (Linux, User mode, 64-bit) 
                              
                            | 
                           
                              
                               The Network Content Inspection Engine is used
                                 to perform network scanning.
                               
                              
                            | 
                        
| 
                              
                               The Network Content Inspection Pattern is used by
                                 the Network Content Inspection Engine to perform network scanning.
                               
                              
                            | 
                        |
| 
                              
                              
                              
                                (Deep Discovery) 
                              
                            | 
                           
                              
                               The Script Analyzer Pattern is used during analysis
                                 of web page scripts to identify malicious code.
                               
                              
                            | 
                        
| 
                              
                               The Spyware/Grayware Pattern identifies unique patterns of bits and bytes that signal
                                 the presence of certain types of potentially undesirable files and programs, such
                                 as adware and spyware, or other grayware.
                               
                              
                            | 
                        |
| 
                              
                               Trusted Certificate Authorities 
                              
                            | 
                           
                              
                               Trusted Certificate Authorities provides the trusted certificate
                                 authorities to verify PE signatures.
                               
                              
                            | 
                        
| 
                              
                                The Virtual Analyzer Configuration Pattern contains configuration information for
                                 Virtual Analyzer, such as supported threat types and supported file types.
                               
                              
                            | 
                        |
| 
                              
                               The Virtual Analyzer Sensors are a collection of utilities
                                 used to execute and detect malware and to record behavior in Virtual Analyzer.
                               
                              
                            | 
                        
| 
                              
                               Option 
                              
                            | 
                           
                              
                               Task 
                              
                            | 
                        
|---|---|
| 
                              
                               Update Now 
                              
                            | 
                           
                              
                               Select one or more components, and click Update Now to manually update the selected components.
                               
                              
                            | 
                        
| 
                              
                               Rollback 
                              
                            | 
                           
                              
                               Select one or more components, and click Rollback to revert the selected components to a previous version.
                               
                              
                            | 
                        
| 
                              
                               Sync Version Information 
                              
                            | 
                           
                              
                               Click to retrieve the component version from the update source, and review if any
                                 of the components need updates. 
                               
                              
                               Update any component where the version displayed on the
                                 Version on Update Source column is greater than the
                                 current version. Additionally, Deep Discovery Analyzer displays the version numbers of components with
                                 available updates in a red font.
                               
                              
                            |