The cloud-based query process makes use of two network-based technologies:
-
Trend Micro™
Smart Protection Network™: A globally scaled, Internet-based,
infrastructure that provides services to users who do not have immediate access to
their
corporate network.
-
Smart Protection Server:
Smart Protection Server exists in
the local network. This is made available for users who have access to their local
corporate
network. These servers are designed to localize operations to the corporate network
to optimize
efficiency.
|
Note
Install multiple Smart Protection Servers to ensure the continuity of
protection in the event that connection to a Smart Protection Server is unavailable.
|
These two network-based solutions host the majority of the virus/malware pattern definitions
and web reputation scores. Trend Micro™
Smart Protection Network™ and Smart Protection Server make these definitions available to other endpoints on the network for
verifying potential threats. Queries are only sent to Smart Protection Servers if
the risk of the
file or URL cannot be determined by the endpoint.
Endpoints leverage file reputation and web reputation technology to perform queries
against Smart Protection Servers as part of their regular system protection activities. In
this solution, agents send identification information, determined by Trend Micro technology, to Smart Protection Servers for queries. Agents never send the entire file when using
file reputation technology. The risk of the file is determined using identification
information.