The Connected Threat Defense strategy integrates many Trend Micro products. The following diagrams illustrate how the major products interact.
topology-ctd-primer2.png
Endpoint Protection Example Topology
topology-ctd-primer-.png
Messaging and Network Security Example Topology
Apex Central further monitors other registered Trend Micro products through log analysis and comparison of detected files with the synchronized suspicious object lists.
For Apex Central registration and suspicious object list synchronization information for each major product, refer to the following: