Advanced threats use less conventional means to attack or infect a system. Heuristic
                  scanning can
                  detect advanced threats to mitigate damage to company systems. Enabling ATSE adds
                  another layer of
                  protection to systems against threats that are typically used in targeted attacks.
               
               Some types of advanced threats that ATSE detects include:
               
                  - 
                     
Exploits:
                        Exploits are pieces of code purposely created by attackers to take advantage
                        of software vulnerabilities. Such code is typically incorporated into
                        malware.
                     
                   
                  - 
                     
Targeted attacks: Targeted attacks refer to
                        computer intrusions staged by threat actors that aggressively pursue
                        and compromise specific targets. These attacks seek to maintain
                        a persistent presence within the target's network so that the attackers
                        can move laterally and extract sensitive information.
                     
                   
                  - 
                     
Zero-day threats: Zero-day threats exploit previously
                        unknown vulnerabilities in software.
                     
                   
               
               
                  
                     
                          | 
                        
                           Tip
                           
                              
                              Trend Micro recommends enabling ATSE.
                               
                              
                            
                         |