Data Sources

Threat information received from the following data sources prompts Threat Mitigator to issue mitigation tasks to the affected endpoints.

Endpoint Security Risk Logs

Threat Management Agent can monitor Trend Micro™ OfficeScan™ security risk logs and perform mitigation if necessary.

The log monitoring feature supports OfficeScan 10 and later and only checks virus/malware detection logs during Real-time Scan.

Threat mitigation is triggered when virus/malware detection logs contain any of the following scan results:

During threat mitigation, the agent retrieves the path of an infected file and then uses the Pattern-free Mitigation Engine to check for other files or processes associated with the infected file.

Threat Discovery Appliance

This screen displays a list of Threat Discovery Appliance devices registered to Threat Mitigator. The registered Threat Discovery Appliance devices send information gathered from the network to Threat Mitigator. Threat Mitigator analyzes and assesses the data to determine mitigation action.

Use the Threat Discovery Appliance console to register the appliance to Threat Mitigator.

See also: