New in this Release

New In This Release

This Threat Mitigator version includes the following new features and product enhancements:

New features and product enhancements

New Features

Description

New in version 2.5 Service Pack 1

Pattern for custom cleanup

Smart scan related patterns can now be used to run custom cleanup. In the previous version, only custom patterns can be used.

For more information, see Pattern Deployment.

Platform and browser support

  • Threat Management Agent can now be installed on computers running Windows 7 (32-bit).

  • Internet Explorer 8 can now be used to access the product console, perform browser-based installation, or launch On-demand Scan.

Enhanced integration with OfficeScan client

If the OfficeScan client is installed on the endpoint, the client may perform an action against a specific threat before the Threat Management Agent can take action. In this release, when the agent detects that the OfficeScan client has taken an action, it no longer performs an action and reports the event to Threat Mitigator. Threat Mitigator displays the event in the threat event logs.

SNMP trap enhancements

This release supports additional SNMP traps for collecting Threat Mitigator data and monitoring product-related events.

For details about new SNMP traps, see SNMP Traps and Queries.

Agent uninstallation

This version supports agent uninstallation from a command-line interface. For details, see Uninstallation from a Command Line Interface.

Log enhancements

Threat event logs can now be transmitted to a syslog server.

New in version 2.5

On-demand Scan

On-demand Scan offers the same type of protection provided by endpoint security software (such as Trend Micro Internet Security™) but does not require software to be installed on the endpoint.

On-demand Scan is intended primarily for agentless endpoints, where routine threat mitigation tasks cannot be performed. It can also be run on endpoints with Threat Management Agent to complement routine threat mitigation tasks performed by the agent.

For details about On-demand Scan, see On-demand Scan.

Smart scan

Threat Mitigator leverages Trend Micro smart scan technology during routine mitigation tasks and On-demand Scan.

For details about Smart Scan, see Smart Scan Server.

Threat management

A new Threat Management page allows you to:

  • Identify endpoints that require mitigation, or endpoints that encountered On-demand Scan problems.

  • Run tasks on specific endpoints, such as cleanup, On-demand Scan, or custom pattern deployment.

  • Submit a case to TrendLabs through Threat Management Services so that a dedicated Trend Micro security expert can analyze the case (based on the data collected from the endpoint) and issue a custom pattern, if necessary.

For details, see Threat Management.

Scan type

After deploying a custom pattern, you can now choose to run a quick or full scan on the endpoint.

For details, see step 3 in Mitigation Tasks.

Agent installation

Allow users to install Threat Management Agent by providing them a URL that launches the agent installation program. You can also use the Packager tool to create an agent installation package that can be deployed to many endpoints.

For details, see Agent Deployment Methods.

Mitigation action

Enhanced threat mitigation on endpoints allows administrators to configure threat mitigation tasks, submit cases to TrendLabs, and deploy custom patterns to specific endpoints.

For details, see Mitigation Tasks.

Data sources

A wider range of data is analyzed. Aside from the data sent by Threat Discovery Appliance, Threat Mitigator also checks the OfficeScan installation folder for the necessary virus/malware log files.

For details, see Data Sources.

Threat Management Services bandwidth allocation

You can now set the upload and download limits for Threat Management Services to avoid disruptions to regular network traffic during the upload or download. For details, see Threat Management Services.

See also: