Checking the Latest Components

To check the component version currently used and the date of the last update, click the Component versions link on the Overview tab.

Trend Micro Portable Security uses the following components.

To select the components to download, see Scan Settings (Others).

Table 1. Trend Micro Portable Security Components

Component

Description

Virus Scan Engine (32-bit/64-bit)

At the heart of all Trend Micro products lies the scan engine, which was originally developed in response to early file-based computer viruses. The scan engine today is exceptionally sophisticated and capable of detecting different types of viruses and malware. The scan engine also detects controlled viruses that are developed and used for research.

Rather than scanning every byte of every file, the engine and pattern file work together to identify the following:

  • Tell-tale characteristics of the virus code

  • the precise location within a file where the virus resides

Behavior Monitoring Core Driver (32-bit/64-bit)

Prevents Trend Micro Portable Security 2 from being affected by rootkits which hide drivers, processes, and registry entries from tools that use common system application programming interfaces (APIs).

Scanner (32-bit/64-bit)

This engine scans, cleans, and restores tasks.

Damage Cleanup Engine (32-bit/64-bit)

Scans for and removes Trojans and Trojan processes.

Virus Pattern

Contains information that helps Security Agents identify the latest virus/malware and mixed threat attacks.

Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/malware.

Damage Cleanup Template

Used by the Virus Cleanup Engine to identify Trojan files and processes so the engine can eliminate them.

Spyware/Grayware Pattern

Identifies spyware/grayware in files and programs, modules in memory, Windows registry, and URL shortcuts.

Digital Signature Pattern

A list of approved programs that are regarded safe and will be excluded for scans.

Program Inspection Pattern

The pattern was designed to have the rule set for program inspection. The rule types include CLSID, file path, product name, company name, shortcut, and related registry. It also contains the fake AV detection rules. Currently it is used for fake AV detection for most of cases, so it would also be the fake AV pattern.