Skip to content

OfficeScan - Endpoint Protection

Pinterest
More Options

XGen™ endpoint security from the trusted leader

Trend Micro™ OfficeScan™ with XGen™ endpoint security infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilization.

OfficeScan
  • Secure file servers, PCs, Macs, laptops, Point of Sale, ATMs, and virtualized desktops
  • Threat protection with high-fidelity machine learning, behavioral analysis, file reputation, variant protection, web protections, exploit prevention and more
  • Protect against data loss and theft
  • Get real-time updates with local sandbox integration

Maximum XGen™ Security

Infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks.

  • Progressively filters out threats using the most efficient technique for maximum detection without false positives.
  • Blends signature-less techniques including high-fidelity machine learning, behavioral analysis, variant protection, census check, application control, exploit prevention, and good-file check with other techniques like file reputation, web reputation, and command and control (C&C) blocking.
  • Trend Micro is the first to infuse ‘high-fidelity’ machine learning into its approach – uniquely analyzing files not only before execution but also during runtime for more accurate detection, with noise cancellation like census and whitelist checking at each layer to reduce false positives.
  • Instantly shares information on suspicious network activity and files with other security layers to stop subsequent attacks.
  • Advanced ransomware protection, monitors for suspicious file encryption activities at the endpoint, terminates malicious activities and even recovers lost files if necessary.

Minimum Impact

Reduce user impact and management costs

  • Lightweight and optimized security uses the right detection technique at the right time to ensure minimal impact on devices and networks.
  • Comprehensive central view of endpoint status lets you quickly get visibility to security risks.
  • Automatic sharing of threat intelligence across security layers enables organization wide protection of emerging threats.
  • Enable off-premise compliance and protection with the Edge relay that enables employees to work outside the corporate network and still connect to OfficeScan without a VPN.
  • Customizable dashboards to fit different admin responsibilities.
  • 24x7 support means that if a problem arises, Trend Micro is there to resolve it quickly.

Proven Security Partner

Trend Micro has a history of constant innovation to provide the most effective and efficient security technologies. We are always looking ahead to develop the technology needed to fight tomorrow’s ever changing threats.

Customizable endpoint protection

With OfficeScan’s flexible architecture, you can add security services as needed and apply updates quickly and easily.

Check out the modules and complementary products



Get more from your Trend Micro endpoint security with the broadest range of protection, available through optional security modules and complementary endpoint solutions:

 

Data Loss Prevention (DLP) Module

Protects your sensitive data with integrated DLP for maximum visibility and control.

  • Protects private data on- or off-network, encrypting files before they leave your network
  • Prevents data leaks via cloud storage, USB drives or connected mobile devices, Bluetooth connection, and other media
  • Covers the broadest range of devices, applications, and file types
  • Aids compliance with greater visibility and enforcement

Security for Mac Module

Provides a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X.

  • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware
  • Saves time and effort with centralized management across endpoints, including Macs

Virtual Desktop Infrastructure (VDI) Module

Lets you consolidate your endpoint security into one solution for both physical and virtual desktops.

  • Recognizes whether an agent is on a physical or virtual endpoint, and optimizes protection and performance for its specific environment
  • Serializes scans and updates, and whitelists base images and previously scanned content to preserve the host resources

Vulnerability Protection

Stops zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.

  • Eliminates risk exposure by shielding vulnerabilities with virtual patching
  • Protects from ransomware that takes advantage of unpatched software vulnerabilities, a target for exploit kit-based attacks
  • Reduces down-time for recovery and emergency patching
  • Allows patching on your own terms and timelines

Mobile Security Integration

Deploy Trend Micro Mobile Security to extend protection to smart phones and tablets.

  • Integrates OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security
  • Combines mobile device anti-malware, mobile app management, mobile device management (MDM), and data protection in a single solution
  • Enforces policies for data access and protection, passwords, data encryption, and remote lock and wipe

Endpoint Encryption

Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.

  • Protects data at rest with full-disk encryption software
  • Automates data management with self-encrypting hard drives
  • Sets granular policies for device control and data management

Endpoint Application Control

Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.

  • Protects against users or machines executing malicious software
  • Dynamically and automatically creates application white lists, which only allow known good applications to execute on your endpoint, stopping unknown apps like ransomware in their tracks.
  • Locks down systems to only the applications your organizations wants used approves
  • Uses correlated threat data to maintain an up-to-date database of validated, good applications

Endpoint Sensor Option

Provides context-aware endpoint security monitoring that records and reports detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack.

  • Detects and analyzes your attackers
  • Immediately adapts protection against attack
  • Rapidly responds before sensitive data is lost

Trend Micro™ Control Manager™ Option

This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premises, cloud, and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.


open all

Minimum recommended server requirements

OfficeScan Server Operating Systems:

  • Windows Server 2008 (SP2) and 2008 R2 (SP2) (x64) Editions
  • Windows Storage Server 2008 (x86/x64), Storage Server 2008 R2 (SP1) (x64) Editions
  • Windows HPC Server 2008 and HPC Server 2008 R2 (x64)
  • Windows MultiPoint Server 2010 (x64) and 2012 (x64)
  • Windows Server 2012 and 2012 R2 (x64) Editions
  • Windows MultiPoint Server 2012 (x64) Editions
  • Windows Storage Server 2012 (x64) Editions
  • Windows Server 2016 (x64) Editions

OfficeScan Server Platform:

  • Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
    Memory: 1 GB minimum (2 GB recommended) with at least 500 MB exclusively for OfficeScan (on Windows 2008 family) 2 GB minimum with at least 500 MB exclusively for OfficeScan (on Windows 2010/2011/2012/2016 family) Disk Space: 6.5 GB minimum, 7 GB minimum (using remote install)

OfficeScan Edge Relay Server Platform:

  • Processor: 2 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 4 GB minimum
  • Disk Space: 50 GB minimum
  • Operation System: Windows Server 2012 R2
  • Network Card:
    • 2 network cards connect
      • One for intranet connection to OfficeScan Server
      • One for external connection to off-premises OfficeScan agents
    • 1 network card configuration to use different ports for intranet and internet connections
  • Database:
    • SQL Server 2008 R2 Express (or later)
    • SQL Server 2008 R2 (or later)

Minimum recommended agent requirements

Agent Operating System:

  • Windows XP (SP3) (x86) Editions
  • Windows XP (SP2) (x64) (Professional Edition)
  • Windows Vista (SP1/SP2) (x86/x64) Editions
  • Windows 7 (with/without SP1) (x86/x64) Editions
  • Windows 8 and 8.1 (x86/x64) Editions
  • Windows 10 (32-bit and 64-bit)
  • Windows 10 IoT Embedded
  • Windows Server 2003 (SP2) and 2003 R2 (x86/x64) Editions
  • Windows Compute Cluster Server 2003 (Active/Passive)
  • Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions
  • Windows Server 2008 (SP2) (x86/x64) and 2008 R2 (SP1) (x64) Editions
  • Windows Storage Server 2008 (SP2) (x86/x64) and Storage Server 2008 R2 (x64) Editions
  • Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64) Editions
  • Windows Server 2008/2008 R2 Failover Clusters (Active/Passive)
  • Windows MultiPoint Server 2010 and 2011 (x64)
  • Windows Server 2012 and 2012 R2 (x64) Editions
  • Windows Storage Server 2012 and 2012 R2 (x64) Editions
  • Windows MultiPoint Server 2012 (x64) Editions
  • Windows Server 2012 Failover Clusters (x64)
  • Windows Server 2016 (x64) Editions
  • Windows XP Embedded Standard (SP1/SP2/SP3) (x86)
  • Windows Embedded Standard 2009 (x86)
  • Windows Embedded POSReady 2009 (x86), Embedded POSReady 7 (x86/x64)
  • Windows 7 Embedded (x86/x64) (SP1)
  • Windows 8 and 8.1 Embedded (x86/x64) Editions

Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1, 10 family)
    • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Vista, Windows Embedded POS, Windows 2008 (x86) family)
    • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 (x64), Windows 2016 family)
  • Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family)
    • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 2008, 2010, 2011, 2012 family)
    • 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows Vista family)
    • 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x86), 8 (x86), 8.1 (x86), Windows Embedded POSReady 7 family)
    • 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x64), 8 (x64), 8.1 (x64) family)
  • Disk Space: 650 MB minimum

Detailed requirements are available online at docs.trendmicro.com


Social Media

Connect with us on