Threat Mitigator Integration
Threat Mitigator integrates with the following Trend Micro products and services. For seamless integration, ensure that the products run the required or recommended versions.
Products and services that integrate with Threat Mitigator |
Product |
Description |
Version |
Threat Discovery Appliance |
Acts as a data source for Threat Mitigator. Threat Discovery Appliance sends mitigation requests to Threat Mitigator after a threat is detected, and then notifies Threat Management Agent to run a mitigation task.
|
|
Threat Management Services Portal (TMSP) |
A security portal used for collecting forensic data from specific endpoints and issuing custom solutions to eliminate unresolved threats.
|
2.6 (for the on-premise edition of TMSP) |
OfficeScan client |
Also acts as a data source for Threat Mitigator. Threat Management Agent monitors virus/malware detections logged by the OfficeScan client and then reports threats that have not been completely removed to Threat Mitigator. Threat Mitigator then notifies the agent to run a mitigation task. |
10.0 (minimum) |
Smart Protection Network™ |
Provides the file reputation service, an in-the-cloud hosted solution that verifies potential threats detected during post-assessment cleanup or On-demand Scan. Endpoints connected to the corporate network send scan queries to Smart Protection Network if a Smart Protection Server is unavailable to confirm the risk of a file. Smart Protection Network is hosted by Trend Micro. For details, see Smart Protection Technology. |
Not applicable |
Smart Protection Server |
Provides the same file reputation service offered by Smart Protection Network. Smart Protection Server is intended to localize the service to the corporate network to optimize efficiency. Endpoints connected to the corporate network send scan queries to Smart Protection Server if the risk of a file cannot be confirmed. |
|
Control Manager |
A software management solution that gives you the ability to control antivirus and content security programs from a central location—regardless of the platform or the physical location of the program. For details, see Trend Micro Control Manager. |
5.5 |
Enforcement device |
Receives requests from Threat Mitigator to:
|
Contact your Trend Micro representative for details. |
See also: