Views:
Advanced threats use less conventional means to attack or infect a system. Heuristic scanning can detect advanced threats to mitigate damage to company systems. Enabling ATSE adds another layer of protection to systems against threats that are typically used in targeted attacks.
Some types of advanced threats that ATSE detects include:
  • Exploits: Exploits are pieces of code purposely created by attackers to take advantage of software vulnerabilities. Such code is typically incorporated into malware.
  • Targeted attacks: Targeted attacks refer to computer intrusions staged by threat actors that aggressively pursue and compromise specific targets. These attacks seek to maintain a persistent presence within the target's network so that the attackers can move laterally and extract sensitive information.
  • Zero-day threats: Zero-day threats exploit previously unknown vulnerabilities in software.
Tip
Tip
Trend Micro recommends enabling ATSE.