Skip to content

Endpoint Application Control

More Options

Prevent unwanted and unknown applications from executing

Endpoint Application Control

Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Enhance your defenses with flexible, easily managed policies, whitelisting and blacklisting capabilities combined with a global, cloud-powered application database.

Don't let malicious applications take over your endpoints

Protect your endpoints against the army of new malicious software applications being rolled out daily. Endpoint Application Control helps you safeguard your data and machines against unauthorized access and user error. Plus, it’s integrated with Trend Micro Complete user protection solutions which strengthens your defenses with multiple layers of interconnected protection. Even better, it’s easy to manage and deploy when you use it with your existing OfficeScan endpoint security.

  • Protects against users or machines executing malicious software
  • Provides advanced features to enforce corporate policies
  • Uses correlated threat data from billions of records daily
  • Helps support compliance requirements

Other key features

  • Enhanced protection. Using the latest protection from real-time threat intelligence correlated across a global network, you get the most up-to-date endpoint application protection against malware, targeted attacks and zero-day threats.
  • Simplified management. Streamlined dashboard and management console offers greater insight into threat outbreaks and allows you to standardize end-user configurations from one centralized location.
  • In-depth whitelisting and blacklisting. Block unknown and unwanted applications with basic, advanced cloud-powered, and roll-your-own application whitelisting and blacklisting options. Delivers unparalleled breadth of applications and good file data.
  • Compliance with internal IT policies. Reduce legal and financial liabilities by limiting application usage to a specific list supported by data loss prevention products. Plus you can implement system lockdown to prevent new applications from being executed.

Systems requirements

Minimum recommended server requirements
Server operating systems:

  • Microsoft Windows Server 2008 and 2008 R2 (Standard or Enterprise Edition) (x86/x64)
  • Microsoft Windows Server 2012 and 2012 R2 (x86/x64)
  • (Optional) IIS v7.0 or higher with these modules: CGI, ISAPI, ISAPI Extensions

Server platform:

  • Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 2GB RAM recommended
  • Disk Space: 10GB recommended

Minimum recommended agent requirements
Agent operating system:

  • Windows (x86 SP3 /x64 SP2) XP Editions
  • Windows (x86/x64) Vista Editions
  • Windows (x86/x64) 7 Editions
  • Windows (x86/x64) 8, 8.1 Editions
  • Microsoft Windows (x86/x64) Server 2003, 2003 R2
  • Microsoft Windows (x86/x64) Server 2008, 2008 Core, 2008 R2, 2008 R2 Core
  • Microsoft Windows Server 2012, 2012 R2
  • Windows Embedded Enterprise, PoS Ready 2009, XPe, Standard 2009, Standard 7

Agent platform:

  • Processor: 300MHz Intel Pentium or equivalent
  • Memory: 512MB RAM
  • Disk Space: 350MB

Social Media

Connect with us on