The cloud-based query process makes use of two network-based technologies:
-
Trend Micro
Smart Protection Network™: A globally scaled, Internet-based,
infrastructure that provides services to users who do not have immediate access to
their
corporate network.
-
Smart Protection Server:
Smart Protection Server
exists in the local network. This is made available for users who have access to their
local
corporate network. These servers are designed to localize operations to the corporate
network
to optimize efficiency.
 |
Note
Install multiple Smart Protection Server
computers to ensure the continuity of protection in the event that connection to a
Smart Protection Server is unavailable.
|
These two network-based solutions host the majority of the virus/malware pattern definitions
and web reputation scores. Trend Micro Smart
Protection Network and Smart Protection Server make
these definitions available to other endpoints on the network for verifying potential
threats.
Queries are only sent to Smart Protection Servers if the risk of the file or URL cannot
be
determined by the endpoint.
Endpoints leverage file reputation and web reputation technology to perform queries
against Smart Protection Server computers as part of their
regular system protection activities. In this solution, agents send identification
information,
determined by Trend Micro technology, to Smart Protection Server computers for queries. Agents
never send the entire file when using file reputation technology. The risk of the
file is
determined using identification information.