Skip to content

Trend Micro Endpoint Application Control

More Options

Prevent unwanted and unknown applications from executing

Endpoint Application Control

Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Enhance your defenses with flexible, easily managed policies, whitelisting and blacklisting capabilities combined with a global, cloud-powered application database.

Say NO to ransomware
Over 100 million threats blocked and counting

Protect yourself

Don't let malicious applications take over your endpoints

Protect your endpoints against the army of new malicious software applications being rolled out daily. Endpoint Application Control helps you safeguard your data and machines against unauthorized access and user error. Plus, it’s integrated with Trend Micro User protection solutions which strengthens your defenses with multiple layers of interconnected protection. For even greater insight into threats, user-based visibilty is available in the local console or in the centrally managed Trend Micro Control Manager.

  • Protects against users or machines executing malicious software
  • Provides advanced features to enforce corporate policies
  • Uses correlated threat data from billions of records daily
  • Helps support compliance requirements

Other key features

  • Enhanced protection. Using the latest protection from real-time threat intelligence correlated across a global network, you get the most up-to-date endpoint application protection against malware, targeted attacks and zero-day threats.
  • Simplified management. Get greater insight into threat outbreaks with user-based visibility across multiple layers of Trend Micro security solutions, available through with the optional use of Control Manager.
  • In-depth whitelisting and blacklisting. Block unknown and unwanted applications with basic, advanced cloud-powered, and roll-your-own application whitelisting and blacklisting options. Delivers unparalleled breadth of applications and good file data from Trend Micro’s cloud-powered application database with real-time updates.
  • Compliance with internal IT policies. Reduce legal and financial liabilities by limiting application usage to a specific list supported by data loss prevention products. Plus you can implement system lockdown to prevent new applications from being executed.

Systems Requirements

Minimum Recommended Server Requirements
Server Operating Systems:

  • Microsoft Windows Server 2008 and 2008 R2 (Standard or Enterprise Edition) (x86/x64)
  • Microsoft Windows Server 2012 and 2012 R2 (x86/x64)
  • (Optional) IIS v7.0 or higher with these modules: CGI, ISAPI, ISAPI Extensions

Server Platform:

  • Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 2 GB RAM recommended
  • Disk Space: 10 GB recommended

Minimum Recommended Agent Requirements
Agent Operating System:

  • Windows (x86 SP3 /x64 SP2) XP Editions
  • Windows (x86/x64) Vista Editions
  • Windows (x86/x64) 7 Editions
  • Windows (x86/x64) 8, 8.1 Editions
  • Windows 10 (32-bit and 64-bit)
  • Microsoft Windows (x86/x64) Server 2003, 2003 R2
  • Microsoft Windows (x86/x64) Server 2008, 2008 Core, 2008 R2, 2008 R2 Core
  • Microsoft Windows Server 2012, 2012 R2
  • Windows Embedded Enterprise, POSReady 2009, XPe, Standard 2009, Standard 7

Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent
  • Memory: 512 MB RAM
  • Disk Space: 350 MB

Social Media

Connect with us on