Skip to content

Trend Micro Endpoint Application Control

More Options

Prevent Unwanted and Unknown Applications from Executing

User browsing computer

Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Enhance your defenses with flexible, easily managed policies, whitelisting and blacklisting capabilities combined with a global, cloud-powered application database.

Don't let malicious applications take over your endpoints

Protect your endpoints against the army of new malicious software applications being rolled out daily. Endpoint Application Control helps you safeguard your data and machines against unauthorized access and user error. Plus, it’s integrated with Trend Micro Complete User Protection solutions which strengthens your defenses with multiple layers of interconnected protection. For even greater insight into threats, user-based visibilty is available in the local console or in the centrally managed Trend Micro Control Manager.

  • Protects against users or machines executing malicious software
  • Provides advanced features to enforce corporate policies
  • Uses correlated threat data from billions of records daily
  • Helps support compliance requirements

Other Key Features

  1. Enhanced protection. Using the latest protection from real-time threat intelligence correlated across a global network, you get the most up-to-date endpoint application protection against malware, targeted attacks and zero-day threats.
  2. Simplified management. Get greater insight into threat outbreaks with user-based visibility across multiple layers of Trend Micro security solutions, available through with the optional use of Control Manager.
  3. In-depth whitelisting and blacklisting. Block unknown and unwanted applications with basic, advanced cloud-powered, and roll-your-own application whitelisting and blacklisting options. Delivers unparalleled breadth of applications and good file data from Trend Micro’s cloud-powered application database with real-time updates.
  4. Compliance with internal IT policies. Reduce legal and financial liabilities by limiting application usage to a specific list supported by data loss prevention products. Plus you can implement system lockdown to prevent new applications from being executed.

Trend Micro is named a leader in endpoint protection

Learn why Gartner placed us in the leaders’ quadrant


Watch free webinar


Get the guide now


Trend Micro named a champion in endpoint security

Get the Vendor Landscape Report by Info-Tech


Realize higher ROI on security spending

Get study


Systems Requirements

Minimum Recommended Server Requirements
Server Operating Systems:

  • Microsoft Windows Server 2008 and 2008 R2 (Standard or Enterprise Edition) (x86/x64)
  • Microsoft Windows Server 2012 and 2012 R2 (x86/x64)
  • (Optional) IIS v7.0 or higher with these modules: CGI, ISAPI, ISAPI Extensions


Server Platform:

  • Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 2 GB RAM recommended
  • Disk Space: 10 GB recommended


Minimum Recommended Agent Requirements
Agent Operating System:

  • Windows (x86 SP3 /x64 SP2) XP Editions
  • Windows (x86/x64) Vista Editions
  • Windows (x86/x64) 7 Editions
  • Windows (x86/x64) 8, 8.1 Editions
  • Windows 10 (32-bit and 64-bit)
  • Microsoft Windows (x86/x64) Server 2003, 2003 R2
  • Microsoft Windows (x86/x64) Server 2008, 2008 Core, 2008 R2, 2008 R2 Core
  • Microsoft Windows Server 2012, 2012 R2
  • Windows Embedded Enterprise, POSReady 2009, XPe, Standard 2009, Standard 7


Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent
  • Memory: 512 MB RAM
  • Disk Space: 350 MB


Connect with us on