Views:

The following table lists the features available with the Connected Threat Defense architecture and the required and optional products that integrate with each.

Feature

Required Products

Optional Products

Security threat monitoring

Important:

At least one optional product is required to evaluate log data.

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Apex One Endpoint Sensor

  • Cloud App Security 5.0 (or later)

  • Deep Security Manager 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • ScanMail for Microsoft Exchange 12.5 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

Suspicious Object list synchronization

For more information, see Suspicious Object Lists and Connected Threat Defense Product Integration.

Important:

At least one optional product is required for Suspicious Object list synchronization.

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

  • Deep Discovery Director

  • Deep Security Manager 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Smart Protection Server 3.0 Patch 1 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

Suspicious Object sample submission

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Apex One Endpoint Sensor

  • Deep Discovery Email Inspector 3.0 (or later)

  • Deep Security Manager 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • ScanMail for Microsoft Exchange 12.5 (or later)

Suspicious Object management

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Apex One Endpoint Sensor

  • Cloud App Security 5.0 (or later)

  • Deep Security Manager 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

Suspicious Object scan actions

For more information, see Suspicious Object Scan Actions.

  • Apex Central

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Cloud App Security 5.0 (or later)

  • Deep Security Manager 10.0 (or later)

  • InterScan Messaging Security Virtual Appliance 9.1 (or later)

  • InterScan Web Security Virtual Appliance 6.5 SP2 Patch 2 (or later)

  • Smart Protection Server 3.0 Patch 1 (or later)

  • Trend Micro Endpoint Application Control 2.0 SP1 (or later)

Impact analysis

  • Apex Central

  • Apex One Endpoint Sensor

Important:

Performing an impact analysis on Affected Users screen also requires Deep Discovery Inspector 3.8 (or later).

For more information, see Analyzing Impact on Affected Users.

  • Deep Discovery Inspector 3.8 (or later)

Endpoint isolation

For more information, see Isolating Endpoints.

  • Apex Central

  • Apex One 2019 or OfficeScan 11.0 SP1 (or later)

  • Apex One Endpoint Sensor

IOC management

  • Apex Central

  • Apex One Endpoint Sensor

  • None