Skip to content

Trend Micro Vulnerability Protection

Advanced Vulnerability Shielding for Endpoints

Vulnerability Protection

Shield your endpoints temporarily, until you can deploy patches, or indefinitely for out-of-support or un-patchable systems. We’ll help you prevent the exploitation of vulnerabilities (e.g., ransomware exploiting vulnerabilities) with easy- and fast-to-deploy IPS filters. So you get full protection until you can deploy vendor patches when it makes the most sense for your business.

Say NO to ransomware
Over 100 million threats blocked and counting

Protect yourself

Cover exploits with virtual patching at the endpoint

Get earlier, stronger endpoint protection when you supplement client-level antivirus and anti-malware security with proactive virtual patching. A high-performance engine monitors traffic for new, specific OS and application vulnerabilities using host-based intrusion prevention filters as well as zero-day attack monitoring. These capabilities enable you to detect network protocol deviations, suspicious content that signals an attack, or security policy violations.

  • Eliminates risk exposure due to missing patches
  • Extends the life of legacy and end-of-support operating systems like Windows XP
  • Protects from ransomware that takes advantage of unpatched software vulnerabilities--a target for exploit kit-based attacks
  • Allows patching on your own terms and timelines
  • Lowers potential legal exposure by improving data security compliance
  • Enhances firewall protection for remote and mobile enterprise endpoints


Simple, flexible suites protect you now and into the future

Vulnerability Protection is part of the Trend Micro Smart Protection Suites. Learn how Vulnerability Protection contributes to these interconnected, multi-layered security suites to protect your users and their data regardless of device or location.

Other Key Features

  1. Defend against advanced threats. Blocks known and unknown vulnerability exploits before patches are deployed on systems that hold sensitive data, critical to regulatory and corporate policy compliance.
  2. Remove bad data from business-critical traffic. Ensures delivery of business-critical communications with low false positives by filtering forbidden network traffic and ensuring allowed traffic.
  3. Get earlier protection. Provides protection before patches are deployed using attack blocking, vulnerability shielding, and malicious traffic detection.
  4. Deploy and manage within your existing infrastructure. Simply and easily deploys with existing endpoint security solutions and streamlines management with a simplified dashboard and management console.

Systems Requirements

Vulnerability Protection Manager (server)
Server Operating System

  • Microsoft Windows 2012 R2 (64-bit)
  • Microsoft Windows 2012 (64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)


Server Platform

  • Memory: 4 GB (8 GB recommended)
  • Disk Space: 1.5 GB (5 GB recommended)


Web Browser

  • Firefox 12+
  • Internet Explorer 9.x & 10.x
  • Chrome 20+

Note: Cookies must be enabled on all browsers

Vulnerability Protection Agent

Agent Operating System

  • Windows 10 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows Server 2012 R2 (64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows Server 2012 (64-bit)
  • Windows 7 (32-bit and 64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)
  • Windows Vista (32-bit and 64-bit)
  • Windows Server 2003 SP1 (32-bit and 64-bit) patched with "Windows Server 2003 Scalable Networking Pack"
  • Windows Server 2003 SP2 (32-bit and 64-bit)
  • Windows Server 2003 R2 SP2 (32-bit and 64-bit)
  • Windows XP (32 bit and 64 bit)


Agent Platform

  • Memory: 128 MB
  • Disk Space: 500 MB

Social Media

Connect with us on