Collapse AllExpand All
  • access control
  • actions
    • compressed files [1]
  • ActiveAction [1]
  • ActiveUpdate [1] [2]
    • incremental updates [1]
  • advanced threats [1]
    • APT [1]
    • exploits [1]
    • targeted attacks [1]
    • zero-day attacks [1]
  • adware [1]
  • compressed files [1] [2] [3] [4]
    • actions [1]
    • compression types [1]
    • Denial-of-Service [1]
  • compression types [1]
  • configuring
    • access control [1] [2]
    • macro scans [1]
    • proxy settings [1] [2]
    • World Virus Tracking Program [1]
  • contacting
    • technical support [1]
  • Control Manager
    • see Trend Micro Control Manager [1]
  • criteria
    • customized expressions [1]
    • keywords [1]
  • customized expressions [1] [2]
  • customized keywords [1]
  • data identifiers [1]
    • expressions [1]
    • keyword lists
    • keywords [1]
  • Data Loss Prevention [1] [2]
  • Denial-of-Service [1] [2] [3]
  • Denial-of-Service attack [1]
  • dialers [1]
  • disease vector [1]
  • encoding types [1]
  • expressions [1] [2]
  • grayware [1]
  • hacking tools [1]
  • IntelliScan [1]
  • joke program [1] [2]
  • keywords [1] [2]
  • logs
  • macro scan [1]
  • macro viruses/malware [1]
  • manual scan
    • compressed file handling [1] [2]
  • manual updates [1]
  • mass-mailing attack [1]
  • multipurpose internet mail extensions [1]
  • notifications
    • web reputation [1]
  • one-time reports [1] [2]
    • generating [1]
  • operator [1]
  • password cracking applications [1]
  • pattern files [1]
    • incremental updates [1]
    • updates [1]
  • PCRE [1]
  • Perle Compatible Regular Expressions [1]
  • phish [1] [2] [3]
  • policies
    • Data Loss Prevention [1]
  • predefined expressions [1]
  • predefined templates [1]
  • proxy settings [1] [2]
  • real-time monitor [1]
    • viewing remote servers [1]
  • registering
    • to Control Manager [1]
  • remote access tools [1]
  • remote servers
    • viewing with real-time monitor [1]
  • reports
    • generating scheduled [1]
    • maintenance [1]
    • one-time reports [1] [2]
    • scheduled [1]
  • role
  • scan engine [1]
  • scans
    • macro scan [1]
  • scheduled scan
    • compressed file handling [1] [2]
  • scheduled updates [1]
  • security information site [1]
  • security risks [1]
    • advanced threats [1]
    • compressed files [1]
    • Denial-of-Service [1]
    • Denial-of-Service attack [1]
    • disease vector [1]
    • encoding types [1]
    • grayware [1]
    • joke program [1]
    • macro viruses/malware [1]
    • mass-mailing attack [1]
    • multipurpose internet mail extensions [1]
    • other malicious codes [1]
    • packed files [1]
    • phish [1] [2] [3]
    • spyware [1]
    • spyware/grayware [1] [2]
    • Trojan Horse [1] [2]
    • true file type [1] [2]
    • virus/malware writers [1]
    • viruses/malware [1] [2]
    • worms [1] [2]
    • zip-of-death [1]
  • security risk scan
    • compressed file handling [1] [2]
    • IntelliScan [1]
  • spyware [1]
  • spyware/grayware [1] [2]
    • adware [1]
    • dialers [1]
    • entering the network [1]
    • hacking tools [1]
    • joke program [1]
    • malware naming [1]
    • password cracking applications [1]
    • remote access tools [1]
    • risks and threats [1]
  • Spyware Pattern [1]
  • support
    • knowledge base [1]
  • support/system debugger [1] [2]
  • targets
    • web reputation [1]
  • technology
    • scan engine [1]
  • templates [1] [2]
  • TrendLabs [1]
  • Trend Micro Control Manager [1] [2]
    • agent [1]
    • communication protocol [1]
    • communicator [1]
    • entity [1]
    • registering [1]
    • server [1]
    • unregistering [1]
  • Trojan Horse [1] [2]
  • true file type [1] [2]
  • unregistering
    • from Control Manager [1]
  • updates
    • ActiveUpdate [1]
    • download source [1]
    • manual updates [1]
    • pattern files [1]
    • scheduled updates [1]
  • updating, about [1]
  • URLs
    • email technical support [1]
    • security information site [1]
  • viruses/malware [1] [2] [3]
  • web reputation [1] [2] [3] [4] [5] [6]
  • World Virus Tracking Program [1] [2]
    • configuring [1]
  • worms [1] [2]
  • zip-of-death [1]

IM Security Overview Parent topic

Instant messaging can mean instant exposure to fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Trend Micro™ IM Security for Microsoft™ Lync™ Server secures your real-time IM communications by stopping the wide range of threats—faster than ever. In-the-cloud Web Reputation blocks links to malicious sites before the links can be delivered. Signature-independent zero-day security, leading antivirus, and antispyware work together to stop malware before any damage can occur. Plus, flexible Content Filtering and Data Loss Protection features ensure appropriate IM use and prevent data theft.
fig0101.jpg

IM Security deployment

IM Security incorporates virus/malware and spyware/grayware scanning, Content Filtering, URL filtering, File Blocking, Data Loss Prevention, and Communication Control into one cohesive solution.