On-demand Scan
On-demand Scan offers the same type of protection provided by endpoint security software (such as Trend Micro Internet Security™) but does not require software to be installed on the endpoint. Instead, the On-demand Scan program downloads a set of files from Threat Mitigator to a temporary folder in the endpoint. Scan results, logs, and other security information obtained during On-demand Scan are stored in this folder. Users can manually remove the folder if they no longer want to run the scan.
On-demand Scan can be launched on any endpoint on the network but is most useful on endpoints that do not have Threat Management Agent installed (also referred to as "agentless endpoints" in this document) and are connecting to the network for a limited period of time. For example, if you have guests or contractors who bring with them their own notebook computers, you can instruct them to run On-demand Scan instead of installing Threat Management Agent. On-demand Scan does not conflict with Trend Micro or third-party security software already installed on the endpoint.
On-demand Scan also leverages Trend Micro smart protection technology used during threat mitigation.
See also: