New in this Release

New In This Release

This Threat Mitigator version includes the following new features and product enhancements:

New features and product enhancements

New Features

Description

Security enforcement

In security enforcement, an endpoint’s security posture is established by assessing its compliance with security assessment rules. Non-compliant endpoints are isolated from the network until compliance is achieved.

Security enforcement also adds a level of protection during threat mitigation by isolating endpoints with unresolved threats.

For details, see Security Enforcement.

Control Manager integration

Threat Mitigator integrates with Trend Micro Control Manager starting in this release. For integration details, see Trend Micro Control Manager.

Post-installation scan

Scan an endpoint for threats immediately after installing the agent. For details, see Agent Settings.

Endpoint status

Monitor the security status of endpoints from the Endpoint Status screen. For details, see Endpoint Status.

Threat management enhancement

In the Threat Management screen, you can now perform the following tasks:

  • View endpoints that require a restart

  • Launch On-demand Scan on several or all connected endpoints

For details, see Threat Management.

Custom pattern enhancement

  • Custom patterns no longer expire.

  • By default, Threat Mitigator keeps 5 custom patterns in its storage directory.

See also: