Key Features and Benefits

OfficeScan provides the following features and benefits.

Table 1. Key Features and Benefits



Plug-in Manager and Plug-in Solutions

Plug-in Manager facilitates the installation, deployment, and management of plug-in solutions.

Administrators can install two kinds of plug-in solutions:

  • Plug-in programs

  • Native OfficeScan features

Centralized Management

A web-based management console gives administrators transparent access to all agents and servers on the network. The web console coordinates automatic deployment of security policies, pattern files, and software updates on every agent and server. And with Outbreak Prevention Services, it shuts down infection vectors and rapidly deploys attack-specific security policies to prevent or contain outbreaks before pattern files are available. OfficeScan also performs real-time monitoring, provides event notification, and delivers comprehensive reporting. Administrators can perform remote administration, set customized policies for individual desktops or groups, and lock agent security settings.

Security Risk Protection

OfficeScan protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak. To contain outbreaks, OfficeScan enforces outbreak prevention policies and isolates infected computers until they are completely risk-free.

OfficeScan uses smart scan to make the scanning process more efficient. This technology works by off-loading a large number of signatures previously stored on the local endpoint to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced.

For information about smart scan and how to deploy it to agents, see Scan Method Types.

Damage Cleanup Services

Damage Cleanup Services™ cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:

  • Detects and removes live Trojans

  • Kills processes that Trojans create

  • Repairs system files that Trojans modify

  • Deletes files and applications that Trojans drop

Because Damage Cleanup Services runs automatically in the background, it is not necessary to configure it. Users are not even aware when it runs. However, OfficeScan may sometimes notify the user to restart their endpoint to complete the process of removing a Trojan.

Web Reputation

Web reputation technology proactively protects agent computers within or outside the corporate network from malicious and potentially dangerous websites. Web reputation breaks the infection chain and prevents downloading of malicious code.

Verify the credibility of websites and pages by integrating OfficeScan with the Smart Protection Server or the Trend Micro Smart Protection Network.

OfficeScan Firewall

The OfficeScan firewall protects agents and servers on the network using stateful inspections and high performance network virus scans.

Create rules to filter connections by application, IP address, port number, or protocol, and then apply the rules to different groups of users.

Data Loss Prevention

Data Loss Prevention safeguards an organization’s digital assets against accidental or deliberate leakage. Data Loss Prevention allows administrators to:

  • Identify the digital assets to protect

  • Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email messages and external devices

  • Enforce compliance to established privacy standards

Device Control

Device Control regulates access to external storage devices and network resources connected to computers. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.

Behavior Monitoring

Behavior Monitoring constantly monitors agents for unusual modifications to the operating system or on installed software.