Views:

Worry-Free Business Security makes use of components to keep agents protected from the latest threats. Keep these components up-to-date by running manual or scheduled updates.

You can view the component list by performing the following:

  • Go to Updates > Manual.

  • Go to Live Status and click Check Component Status on the Agent Status widget.

The following tables list the components downloaded by the Security Server from the ActiveUpdate server:

Table 1. Messaging Components (Advanced only)

Component

Distributed To

Description

Messaging Security Agent Anti-spam Pattern

Messaging Security Agents

The Anti-spam Pattern identifies the latest spam in email messages and email attachments.

Messaging Security Agent Anti-spam Engine 32/64-bit

Messaging Security Agents

The Anti-spam Engine detects spam in email messages and email attachments.

Messaging Security Agent Scan Engine 32/64-bit

Messaging Security Agents

The Scan Engine detects Internet worms, mass-mailers, Trojans, phishing sites, spyware, network exploits and viruses in email messages and email attachments.

Messaging Security Agent URL Filtering Engine 32/64-bit

Messaging Security Agents

The URL Filtering Engine facilitates communication between Worry-Free Business Security and the Trend Micro URL Filtering Service. The URL Filtering Service is a system that rates URLs and provides rating information to Worry-Free Business Security.

Table 2. Antivirus and Smart Scan

Component

Distributed To

Description

Virus Pattern

Security Agents using conventional scan

The Virus Pattern contains information that helps Security Agents identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/malware.

IntelliTrap Pattern

Security Agents

The IntelliTrap Pattern detects real-time compression files packed as executable files.

For details, see IntelliTrap.

IntelliTrap Exception Pattern

Security Agents

The IntelliTrap Exception Pattern contains a list of "approved" compression files.

Virus Scan Engine 32/64-bit

Security Agents

At the heart of all Trend Micro products lies the scan engine, which was originally developed in response to early file-based viruses. The scan engine today is exceptionally sophisticated and capable of detecting different types of viruses and malware. The scan engine also detects controlled viruses that are developed and used for research.

Rather than scanning every byte of every file, the engine and pattern file work together to identify the following:

  • Tell-tale characteristics of the virus code

  • The precise location within a file where the virus resides

Smart Scan Pattern

Not distributed to Security Agents. This pattern stays in theSecurity Server and is used when responding to scan queries received from Security Agents.

When in smart scan mode, Security Agents use two lightweight patterns that work together to provide the same protection provided by conventional anti-malware and anti-spyware patterns.

The Smart Scan Pattern contains majority of the pattern definitions. The Smart Scan Agent Pattern contains all the other pattern definitions not found on the Smart Scan Pattern.

The Security Agent scans for security threats using the Smart Scan Agent Pattern. Security Agents that cannot determine the risk of the file during the scan verify the risk by sending a scan query to the Scan Server, a service hosted on the Security Server. The Scan Server verifies the risk using the Smart Scan Pattern. The Security Agent "caches" the scan query result provided by the Scan Server to improve the scan performance.

Smart Scan Agent Pattern

Security Agents using smart scan

Damage Cleanup Template

Security Agents

The Damage Cleanup Template is used by the Damage Cleanup Engine to identify Trojan files and processes so the engine can eliminate them.

Damage Cleanup Engine 32/64-bit

Security Agents

The Damage Cleanup Engine scans for and removes Trojans and Trojan processes.

Memory Inspection Pattern

Security Agents

This technology provides enhanced virus scanning for polymorphic and mutation viruses, and augments virus-pattern-based scans by emulating file execution. The results are then analyzed in a controlled environment for evidence of malicious intent with little impact on system performance.

Contextual Intelligence Engine 32/64-bit

Security Agents

The Contextual Intelligence Engine monitors processes executed by low prevalence files and extracts behavioral features that the Contextual Intelligence Query Handler sends to the Predictive Machine Learning engine for analysis.

Contextual Intelligence Pattern

Security Agents

The Contextual Intelligence Pattern contains a list of "approved" behaviors that are not relevant to any known threats.

Contextual Intelligence Query Handler 32/64-bit

Security Agents

The Contextual Intelligence Query Handler processes the behaviors identified by the Contextual Intelligence Engine and sends the report to the Predictive Machine Learning engine.

Advanced Threat Scan Engine 32/64-bit

Security Agents

The Advanced Threat Scan Engine extracts file features from low prevalence files and sends the the information to the Predictive Machine Learning engine.

Advanced Threat Correlation Pattern

Security Agents

The Advanced Threat Correlation Pattern contains a list of file features that are not relevant to any known threats.

Early Boot Cleanup Driver 32/64-bit

Security Agents

The Trend Micro Early Boot Cleanup Driver loads before the operating system drivers which enables the detection and blocking of boot-type rootkits. After the Security Agent loads, Trend Micro Early Boot Cleanup Driver calls Damage Cleanup Services to clean the rootkit.

Table 3. Anti-spyware

Component

Distributed To

Description

Spyware/Grayware Scan Engine v.6 32/64-bit

Security Agents

The Spyware/Grayware Scan Engine scans for and performs the appropriate scan action on spyware/grayware.

Spyware/Grayware Pattern v.6

Security Agents

The Spyware/Grayware Pattern identifies spyware/grayware in files and programs, modules in memory, Windows registry and URL shortcuts.

Spyware/Grayware Pattern

Security Agents

Table 4. Network Virus

Component

Distributed To

Description

Common Firewall Pattern

Security Agents

Like the Virus Pattern, the Common Firewall Pattern helps agents identify virus signatures, unique patterns of bits and bytes that signal the presence of a network virus.

Table 5. Behavior Monitoring and Device Control

Component

Distributed To

Description

Behavior Monitoring Detection Pattern 32/64-bit

Security Agents

This pattern contains the rules for detecting suspicious threat behavior.

Behavior Monitoring Core Driver 32/64-bit

Security Agents

This kernel mode driver monitors system events and passes them to the Behavior Monitoring Core Service for policy enforcement.

Behavior Monitoring Core Service 32/64-bit

Security Agents

This user mode service has the following functions:

  • Provides rootkit detection

  • Regulates access to external devices

  • Protects files, registry keys, and services

Behavior Monitoring Configuration Pattern

Security Agents

The Behavior Monitoring Driver uses this pattern to identify normal system events and exclude them from policy enforcement.

Damage Recovery Pattern

Security Agents

The Damage Recovery Pattern contains policies that are used for monitoring suspicious threat behavior.

Digital Signature Pattern

Security Agents

This pattern contains a list of valid digital signatures that are used by the Behavior Monitoring Core Service to determine whether a program responsible for a system event is safe.

Policy Enforcement Pattern

Security Agents

The Behavior Monitoring Core Service checks system events against the policies in this pattern.

Memory Scan Trigger Pattern (32/64-bit)

Security Agents

The Memory Scan Trigger service executes other scan engines when it detects the process in memory is unpacked.

Program Inspection Monitoring Pattern

Security Agents

The Program Inspection Monitoring Pattern monitors and stores inspection points that are used for Behavior Monitoring.

Threat Tracing Pattern 32/64-bit

Security Agents

The Threat Tracing Pattern identifies fileless malware attacks.

Table 6. Browser Exploits

Component

Distributed To

Description

Browser Exploit Prevention Pattern

Security Agents

This pattern identifies the latest web browser exploits and prevents the exploits from being used to compromise the web browser.

Script Analyzer Unified Pattern

Security Agents

This pattern analyzes script in web pages and identifies malicious script.

Table 7. Predictive Machine Learning

Component

Distributed To

Description

Predictive Machine Learning Local File Model

Security Agents

The Predictive Machine Learning Local File Model identifies portable executable file threats when endpoints disconnect from the Internet.