Key Features and Benefits
Threat Mitigator provides the following features and benefits:
Threat Mitigator features and benefits |
Features |
Descriptions |
Threat mitigation |
Using information gathered from several data sources, Threat Mitigator issues mitigation tasks to Threat Management Agent, including assessment and cleanup. |
Rollback of cleanup tasks |
During cleanup, Threat Management Agent may delete processes, files, and registry keys. If a false positive occurs, you can roll back the cleanup task and restore the deleted files and registry keys. Rollback is performed from the product console. |
Agentless protection |
With On-demand Scan, you can extend protection to agentless endpoints, where routine threat mitigation tasks cannot be performed. On-demand Scan can also be launched on endpoints with agents installed. |
Security enforcement |
Threat Mitigator monitors endpoints for compliance to security assessment rules, and then initiates an action on non-compliant endpoints. |
Smart protection technology |
Trend Micro smart protection technology is used during threat mitigation and On-demand Scan. This technology leverages lightweight patterns stored on the endpoint and in-the-cloud, reducing endpoint footprint while providing the same level of protection offered by conventional patterns. |
See also: