Trend Micro Security (for Mac) makes use of components to keep agent computers protected from the latest security risks. Keep these components up-to-date by running manual or scheduled updates.
In addition to the components, Trend Micro Security (for Mac) agents also receive updated configuration files from the Trend Micro Security (for Mac) server. Agents need the configuration files to apply new settings. Each time you modify Trend Micro Security (for Mac) settings through the web console, the configuration files change.
The Virus Pattern contains information that helps Trend Micro Security (for Mac) identify the latest virus/malware and mixed threat attack. Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/malware.
The Spyware Active-monitoring Pattern contains information that helps Trend Micro Security (for Mac) identify spyware and grayware.
At the heart of all Trend Micro products lies the scan engine, which was originally developed in response to early file-based computer viruses. The scan engine today is exceptionally sophisticated and capable of detecting different types of security risks, including spyware. The scan engine also detects controlled viruses that are developed and used for research.Updating the Scan Engine
By storing the most time-sensitive information about security risks in the pattern files, Trend Micro minimizes the number of scan engine updates while keeping protection up-to-date. Nevertheless, Trend Micro periodically makes new scan engine versions available. Trend Micro releases new engines under the following circumstances:
Incorporation of new scanning and detection technologies into the software
Discovery of a new, potentially harmful security risk that the scan engine cannot handle
Enhancement of the scanning performance
Addition of file formats, scripting languages, encoding, and/or compression formats
The Trend Micro Security (for Mac) agent program provides the actual protection from security risks.