
Key Features and Benefits
Threat Mitigator provides the following features and benefits:
| Threat Mitigator features and benefits | 
| Features | Descriptions | 
| Threat mitigation | Using information gathered from several data sources, Threat Mitigator issues mitigation tasks to Threat Management Agent, including assessment and cleanup. | 
| Rollback of cleanup tasks | During cleanup, Threat Management Agent may delete processes, files, and registry keys. If a false positive occurs, you can roll back the cleanup task and restore the deleted files and registry keys. Rollback is performed from the product console. | 
| Agentless protection | With On-demand Scan, you can extend protection to agentless endpoints, where routine threat mitigation tasks cannot be performed. On-demand Scan can also be launched on endpoints with agents installed. | 
| Security enforcement | Threat Mitigator monitors endpoints for compliance to security assessment rules, and then initiates an action on non-compliant endpoints. | 
| Smart protection technology | Trend Micro smart protection technology is used during threat mitigation and On-demand Scan. This technology leverages lightweight patterns stored on the endpoint and in-the-cloud, reducing endpoint footprint while providing the same level of protection offered by conventional patterns. | 
See also: