features
OfficeScan provides the following features and benefits:
OfficeScan protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak. To contain outbreaks, OfficeScan enforces outbreak prevention policies and isolates infected computers until they are completely risk-free.
OfficeScan uses smart scan to make the scanning process more efficient. This technology works by offloading a large number of signatures previously stored on the local computer to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced.
For information about smart scan and how to deploy it to clients, see Scan Methods.
Damage Cleanup Services™ cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
Detects and removes live Trojans
Kills processes that Trojans create
Repairs system files that Trojans modify
Deletes files and applications that Trojans drop
Because Damage Cleanup Services runs automatically in the background, you do not need to configure it. Users are not even aware when it runs. However, OfficeScan may sometimes notify the user to restart their computer to complete the process of removing a Trojan.
Web reputation technology proactively protects client computers within or outside the corporate network from malicious and potentially dangerous websites. Web reputation breaks the infection chain and prevents downloading of malicious code.
Verify the credibility of websites and pages by integrating OfficeScan with the Smart Protection Server or the Trend Micro Smart Protection Network.
The OfficeScan firewall protects clients and servers on the network using stateful inspections and high performance network virus scans. Create rules to filter connections by application, IP address, port number, or protocol, and then apply the rules to different groups of users.
Digital Asset Control safeguards an organization’s digital assets against accidental or deliberate leakage. Digital Asset Control allows you to:
Identify the digital assets to protect
Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email and external devices
Enforce compliance to established privacy standards
Device Control regulates access to external storage devices and network resources connected to computers. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.
Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software.
OfficeScan provides seamless integration of the Cisco™ Trust Agent, enabling the most effective policy enforcement within a Cisco Self-Defending Network. OfficeScan also includes a Policy Server for automated communication with Cisco Access Control Servers. When integrated with Trend Micro™ Network VirusWall™ or any Network Admission Control (NAC) device, OfficeScan can check clients trying to enter the network and then remedy, redirect, restrict, deny, or permit access. If a computer is vulnerable or becomes infected, OfficeScan can automatically isolate it and its network segments until all computers update or cleanup is complete.
A web-based management console gives administrators transparent access to all clients and servers on the network. The web console coordinates automatic deployment of security policies, pattern files, and software updates on every client and server. And with Outbreak Prevention Services, it shuts down infection vectors and rapidly deploys attack-specific security policies to prevent or contain outbreaks before pattern files are available. OfficeScan also performs real-time monitoring, provides event notification, and delivers comprehensive reporting. Administrators can perform remote administration, set customized policies for individual desktops or groups, and lock client security settings.
Plug-in Manager facilitates the installation, deployment, and management of plug-in solutions.
Administrators can install two kinds of plug-in solutions:
Plug-in programs
Native OfficeScan features
See also: