Mitigation

Performing Threat Mitigation Tasks

Perform threat mitigation tasks if you have Threat Mitigator as part of your threat management strategy.

When threats are not be removed completely from an endpoint during post-assessment cleanup, the following tasks are initiated:

  1. Threat Management Agent notifies Threat Mitigator about the event (that is, that there are unresolved threats in the endpoint).

  2. Threat Mitigator logs the event.

  3. When the Threat Mitigator administrator checks the logs and finds out about the event, the administrator initiates case submission from Threat Mitigator’s Threat Management screen.

  4.  

    Threat Mitigator Threat Management screen - Submit a Case section

    During case submission:

    1. Threat Mitigator notifies the agent to collect forensic data that will be used to analyze unresolved threats. The agent encrypts the data and archives it into a .zip file.

    2.  

      Sample .zip file containing forensic data

    3. The agent uploads the .zip file to Threat Mitigator.

    4. Threat Mitigator uploads the .zip file to TMSP.

  5. After TMSP receives the .zip file, it displays the file name in the administrative console’s Case List screen.

  6. If you enabled event notifications, TMSP sends an email informing you about the .zip file.

  7. Perform the following threat mitigation tasks:

    1. Download and send the forensic data (.zip file) to Trend Micro. For details, see Downloading Forensic Data.

    2. Manage pattern files issued by Trend Micro. For details, see Managing Pattern Files Issued by Trend Micro.