Vulnerability Detection

Trend Micro analyzes your environment to identify any high priority at-risk vulnerabilities in your corporation using global activity data, CVE information, and local detection activity to produce customized vulnerability detection scores for each endpoint.

Zero Trust Risk Insights assesses endpoint data to determine which endpoints have exploitable vulnerabilities and whether threat actors have already attempted to exploit the at-risk endpoints. After comparing the endpoint activity data and the global exploit activity statistics, Zero Trust Risk Insights prioritizes your endpoints that require the most urgent attention.

For more information about the supported operating systems and Microsoft Office products, see Vulnerability Detection System Requirements.

The following table outlines the indicators associated with known vulnerabilities and the related data sources.

Indicator

Description

Data Source

Target

OS vulnerability

The detection of exploitable operating system vulnerabilities on the endpoint

  • Trend Micro Vision One Endpoint Sensor

  • Device

Application vulnerability

The detection of exploitable application vulnerabilities on the endpoint

  • Trend Micro Vision One Endpoint Sensor

  • Device