Skip to content

Trend Micro Endpoint Application Control

More Options

Prevent Unwanted and Unknown Applications from Executing

User browsing computer

Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Defend against malware, ransomware, and targeted attacks with flexible, dynamic policies, whitelisting and blacklisting capabilities, and an extensive application catalog.

Say NO to ransomware
Over 100 million threats blocked and counting

Protect yourself

Don't let malicious applications take over your endpoints

Protect your endpoints against the daily onslaught of new malicious software applications and ransomware. Endpoint Application Control safeguards your data and machines against unauthorized access and user error. Plus, it’s integrated with Trend Micro User Protection solutions, which strengthens your defenses with multiple layers of interconnected protection. User-based visibility and policy management, available in the local console or through the Trend Micro Control Manager central management, provides greater insight into threats.

  • Protects against users or machines executing malicious software
  • Allows only known good applications to execute on your endpoint, stopping unknown apps, like ransomware, in their tracks
  • Uses an extensive categorized application catalog (analyzed and correlated threat data from billions of files in the Trend Micro Smart Protection Network)
  • Employs dynamic policies to allow users to install valid applications based on many reputation-based variables such as prevalence, regional usage, and maturity
  • Ensures that patches/updates associated with whitelisted applications can be installed, and allows the installation of new patches/updates, with trusted sources of change
  • Features roll-your-own application whitelisting and blacklisting for in-house and unlisted applications


Download Magic Quadrant


Watch free webinar


Get it now


Trend Micro named a champion in endpoint security

Get the Vendor Landscape Report by Info-Tech


Realize higher ROI on security spending

Get study

Systems Requirements

Minimum Recommended Server Requirements
Server Operating Systems:

  • Microsoft Windows Server 2008 and 2008 R2 (Standard or Enterprise Edition) (x86/x64)
  • Microsoft Windows Server 2012 and 2012 R2 (x86/x64)
  • (Optional) IIS v7.0 or higher with these modules: CGI, ISAPI, ISAPI Extensions


Server Platform:

  • Processor: 1.7 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 6 GB RAM recommended
  • Disk Space: 45 GB of free disk space


Minimum Recommended Agent Requirements
Agent Operating System:

  • Windows (x86/x64) XP Editions
  • Windows (x86/x64) Vista Editions
  • Windows (x86/x64) 7 Editions
  • Windows (x86/x64) 8, 8.1 Editions
  • Windows (x86/x64) 10 Editions
  • Microsoft Windows (x86/x64) Server 2003, 2003 R2
  • Microsoft Windows (x86/x64) Server 2008, 2008 R2
  • Microsoft Windows Server 2012, 2012 R2
  • Windows Embedded Enterprise, POSReady 2009, POSReady 7, XPe, Standard 2009, Standard 7


Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent
  • Memory: 512 MB RAM
  • Disk Space: 350 MB


Connect with us on