Skip to content

OfficeScan - Endpoint Protection

Pinterest
More Options

Next-generation, high-performance endpoint protection

To protect against today’s fast-evolving threats, you need a holistic protection strategy with advanced, flexible security built for performance. Trend Micro™ OfficeScan™ is part of the Trend Micro connected threat defense that includes the complete lifecycle of security technology to prevent, detect, analyze, and respond for advanced endpoint protection.

  • Secure file servers, PCs, laptops, and virtualized desktops
  • Protect against data loss and theft
  • Increase performance with light and lean architecture
  • Get advanced threat protection with sandbox integration

OfficeScan combines on-premises and cloud security technologies to safeguard file servers, physical and virtual desktops, and laptops, as well as point-of-sale (POS) and ATM endpoints.

 

Next-generation malware protection

Your endpoints are protected on or off the corporate network against viruses, Trojans, worms, spyware, ransomware, and new variants as they emerge.

  • Reduces the burden of pattern file management and lowers performance impact
  • Detects and blocks ransomware encryption activities
  • Identifies and blocks botnet and targeted attack C&C communications
  • Secures users and endpoint systems from accessing malicious web content without relying on updates, to assure zero-day protection
  • Provides rapid response signatures with Deep Discovery network sandbox integration

Optimized security for virtual desktop infrastructure (VDI)

You can isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.

  • Automatically recognizes whether an agent is on a physical or virtual endpoint to better target protection
  • Prevents network, CPU, and storage conflicts by serializing scan and update operations per virtual server
  • Shortens scan times of virtual desktops by whitelisting base images and previously scanned content

Centralized visibility and control

Centralized management gives you heightened visibility and greater control.

  • Manages by-user across threat vectors for complete visibility into the security of your environment
  • Centralizes management for physical and virtual desktops, laptops, file servers, and Macs within a single web console
  • Integrates with Trend Micro Control Manager, allowing you to manage multiple OfficeScan servers and other Trend Micro solutions through a single console
  • Allows you to extend endpoint protection to smartphones and tablets by deploying Trend Micro Mobile Security (additional license required)

Customizable endpoint protection

With OfficeScan’s flexible architecture, you can add security services as needed and apply updates quickly and easily.

Check out the modules and complementary products



Get more from your Trend Micro endpoint security with the broadest range of protection, available through optional security modules and complementary endpoint solutions:

 

Data Loss Prevention (DLP) Module

Protects your sensitive data with integrated DLP for maximum visibility and control.

  • Protects private data on- or off-network, encrypting files before they leave your network
  • Prevents data leaks via cloud storage, USB drives or connected mobile devices, Bluetooth connection, and other media
  • Covers the broadest range of devices, applications, and file types
  • Aids compliance with greater visibility and enforcement

Security for Mac Module

Provides a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X.

  • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware
  • Saves time and effort with centralized management across endpoints, including Macs

Virtual Desktop Infrastructure (VDI) Module

Lets you consolidate your endpoint security into one solution for both physical and virtual desktops.

  • Recognizes whether an agent is on a physical or virtual endpoint, and optimizes protection and performance for its specific environment
  • Serializes scans and updates, and whitelists base images and previously scanned content to preserve the host resources

Vulnerability Protection

Stops zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.

  • Eliminates risk exposure by shielding vulnerabilities with virtual patching
  • Reduces down-time for recovery and emergency patching
  • Allows patching on your own terms and timelines

Mobile Security Integration

Deploy Trend Micro Mobile Security to extend protection to smart phones and tablets.

  • Integrates OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security
  • Combines mobile device anti-malware, mobile app management, mobile device management (MDM), and data protection in a single solution
  • Enforces policies for data access and protection, passwords, data encryption, and remote lock and wipe

Endpoint Encryption

Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.

  • Protects data at rest with full-disk encryption software
  • Automates data management with self-encrypting hard drives
  • Sets granular policies for device control and data management

Endpoint Application Control

Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.

  • Protects against users or machines executing malicious software
  • Locks down systems to only the applications that your organizations wants used
  • Uses correlated threat data to maintain an up-to-date database of validated, good applications

Deep Discovery Endpoint Sensor

Provides context-aware endpoint security monitoring that records and reports detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack.

  • Detects and analyzes your attackers
  • Immediately adapts protection against attack
  • Rapidly responds before sensitive data is lost

Trend MicroTM Control ManagerTM

This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premises, cloud, and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.


open all

Minimum Recommended Server Requirements

Server Operating Systems:

  • Windows Server 2003 (SP2) and 2003 R2 (SP2) (x86/x64) Editions
  • Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions
  • Windows Compute Cluster Server 2003
  • Windows Server 2008 (SP1/SP2) and 2008 R2 (with/without SP1) (x86/x64) Editions
  • Windows Storage Server 2008 and Storage Server 2008 R2 (x86/x64) Editions
  • Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64)
  • Windows MultiPoint Server 2010 and 2012 (x64)
  • Windows Server 2012 and 2012 R2 (x64) Editions
  • Windows MultiPoint Server 2012 (x64) Editions
  • Windows Storage Server 2012 (x64) Editions

Server Platform:

  • Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 1 GB minimum (2 GB recommended) with at least 500MB exclusively for OfficeScan (on Windows 2003/2008 family)
    • 2 GB minimum with at least 500 MB exclusively for OfficeScan (on Windows 2010/2011/2012 family)
  • Disk Space: 5 GB minimum, 5.5 GB minimum (using remote install)

Minimum Recommended Agent Requirements

Agent Operating System:

  • Windows XP (SP3) (x86) Editions
  • Windows XP (SP2) (x64) (Professional Edition)
  • Windows Vista (SP1/SP2) (x86/x64) Editions
  • Windows 7 (with or without SP1) (x86/x64) Editions
  • Windows Embedded POSReady 2009, Embedded POSReady 7
  • Windows 8 and 8.1 (x86/x64) Editions
  • Windows Server 2003 (SP2) and 2003 R2 (x86/x64) Editions
  • Windows Compute Cluster Server 2003 (Active/Passive)
  • Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions
  • Windows Server 2008 (SP1/SP2) and 2008 R2 (with/without SP1) (x86/x64) Editions
  • Windows Storage Server 2008 and Storage Server 2008 R2 (x86/x64) Editions
  • Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64) Editions
  • Windows Server 2008/2008 R2 Failover Clusters (Active/Passive)
  • Windows MultiPoint Server 2010 and 2011 (x64)
  • Windows Server 2012 and 2012 R2 (x64) Editions
  • Windows Storage Server 2012 (x64) Editions
  • Windows MultiPoint Server 2012 (x64) Editions
  • Windows Server 2012 Failover Clusters (x64)

Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1 family)
    • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Vista, Windows Embedded POS, Windows 2008 (x86) family)
    • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 (x64), Windows 2012 family)
  • Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family)
    • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 2008, 2010, 2011, 2012 family)
    • 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows Vista family)
    • 1.0 GB minimum (2. 0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x86), 8 (x86), 8.1 (x86), Windows Embedded POSReady7 family)
    • 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x64), 8 (x64), 8.1 (x64) family)
  • Disk Space: 350 MB minimum

Detailed requirements are available online at docs.trendmicro.com


Connect with us on