Components
Component
|
Description
|
Advanced Threat Correlation Pattern
|
The Advanced Threat Correlation Pattern contains a list of file
features that are not relevant to any known threats.
|
Advanced Threat Scan Engine for Deep Discovery (Linux,
64-bit)
Advanced Threat Scan Engine for Deep Discovery (Linux,
32-bit)
|
The Advanced Threat Scan Engine protects against viruses, malware, and exploits to
vulnerabilities in software such as Java and Flash. Integrated with the Trend Micro Virus Scan Engine, the Advanced Threat Scan Engine employs signature-based, behavior-based,
and aggressive heuristic detection.
|
The Trend Micro Antispam Engine detects spam and phishing content in email
messages and email attachments.
The Antispam Engine also includes the
Email Malware Threat Scan Engine that performs advanced threat scans on email
attachments (including script files and Microsoft Office macroware) to detect
malware.
|
|
The Antispam Pattern identifies the latest spam in email messages and email
attachments.
|
|
Contextual Intelligence Query Handler (Linux, 32-bit)
Contextual Intelligence Query Handler (Linux, 64-bit)
|
The Contextual Intelligence Query Handler processes the behaviors identified by
the Contextual Intelligence Engine and sends the report to the Predictive Machine
Learning engine.
|
The Deep Discovery Malware Pattern contains the detection
routines for virus and malware scanning. Trend Micro updates the Deep Discovery Malware Pattern regularly with
detection routines for new identified threats.
Deep Discovery Email
Inspector
also uses the Deep Discovery Malware Pattern to detect and protect organizations
against mass-mailing attacks.
|
|
Trusted Certificate Authorities
|
Trusted Certificate Authorities Pattern provides the trusted
certificate authorities to verify PE signatures.
|
The IntelliTrap Exception Pattern contains detection
routines for safe compressed executable (packed) files to reduce the amount of
false positives during IntelliTrap scanning.
|
|
The IntelliTrap Pattern contains the detection routines
for compressed executable (packed) file types that are known to commonly obfuscate
malware and other potential threats.
|
|
The Network Content Correlation Pattern implements detection rules defined by Trend Micro.
|
|
Network Content Inspection Engine (Linux, User mode,
64-bit)
|
The Network Content Inspection Engine is used
to perform network scanning.
|
The Network Content Inspection Pattern is used by
the Network Content Inspection Engine to perform network scanning.
|
|
The Script Analyzer Pattern is used during analysis
of web page scripts to identify malicious code.
|
|
The Spyware/Grayware Pattern identifies
unique patterns of bits and bytes that signal the presence of certain types of
potentially undesirable files and programs, such as adware and spyware, or other
grayware.
|
|
Virtual Analyzer Sensors (Linux)
|
The Virtual Analyzer Sensors are a collection of utilities
used to execute and detect malware and to record behavior in Virtual Analyzer.
|
The Virtual Analyzer Configuration Pattern contains
configuration information for Virtual Analyzer, such as supported threat types and
supported file types.
|