On-demand Scan offers the same type of protection provided by endpoint security software (such as Trend Micro Internet Security™) but does not require software to be installed on the endpoint.
On-demand Scan is intended primarily for agentless endpoints, where routine threat mitigation tasks cannot be performed. It can also be run on endpoints with Threat Management Agent to complement routine threat mitigation tasks performed by the agent.
Threat Mitigator leverages Trend Micro smart scan technology during routine mitigation tasks and On-demand Scan.
A new Threat Management page allows you to:
Identify endpoints that require mitigation, or endpoints that encountered On-demand Scan problems.
Run tasks on specific endpoints, such as cleanup, On-demand Scan, or custom pattern deployment.
Submit a case to TrendLabs through Threat Management Services so that a dedicated Trend Micro security expert can analyze the case (based on the data collected from the endpoint) and issue a custom pattern, if necessary.
After deploying a custom pattern, you can now choose to run a quick or full scan on the endpoint.
Allow users to install Threat Management Agent by providing them a URL that launches the agent installation program. You can also use the Packager tool to create an agent installation package that can be deployed to many endpoints.
Enhanced threat mitigation on endpoints allows administrators to change actions, submit cases to TrendLabs, and receive custom patterns specifically for the endpoint environment.
A wider range of data is analyzed. Aside from the data sent by Threat Discovery Appliance, Threat Mitigator also checks the OfficeScan installation folder for the necessary virus/malware log files. If Threat Mitigator detects security risks, Threat Mitigator automatically mitigates risks or adds tasks in the Threat Management page for further action.
Also, registering to Threat Management Services provides correlated
suspicious threat events from Threat Discovery Appliance powered by the
Trend
Micro
You can now set the upload and download limits for Threat Management Services to avoid disruptions to regular network traffic during the upload or download.