Endpoint Sensor

Assess the nature and extent of advanced threats with Endpoint Detection and Response (EDR)

Key Features

Gain insight into advanced threats

Advanced threats can bypass traditional security defenses and spread through an enterprise.  With Endpoint Sensor you can investigate and search for advanced threats by sweeping for Indicators of Compromise (IOC) and hunting for Indicators of Attack (IOAs).  A full root cause analysis can give full visibility into attacks.

Windows® Mac® AndroidTM iOS new Power Up

Search for indicators of attack (IoAs)

Endpoints can be queried (sweeping) for specific communications, specific malware, registry activity, account activity, running processes, and more. Search inputs can be individual parameters, OpenIOC files, or YARA files.

Windows® Mac® AndroidTM iOS new Power Up

Advanced threat hunting

Advanced attacks typically use multiple techniques to carry out their objectives. By discovering and correlating these multiple steps, Endpoint Sensor identifies the attack and builds a root cause analysis, including a remediation plan. Using indicators of attack (IOAs), Endpoint Sensor can discover the many indicators and techniques of advanced threats to give better visibility into all stages of the attack.

Windows® Mac® AndroidTM iOS new Power Up


  • 4 GB minimum, 16 GB recommended.
  • Available disk space: 500 GB minimum, 1 TB recommended
Operating Systems
  • Windows Server 2008 SP2 (32-bit/64-bit)
  • Windows Server 2008 R2 (64-bit)
Microsoft Internet Information Services (IIS) 7
with all of the following role services:
  • Static Content
  • Default Document
  • Directory Browsing
  • HTTP Errors
  • HTTP Redirection
  • ASP
  • CGI
  • ISAPI Extensions
  • ISAPI Filters
  • Request Filtering
  • IIS Management Console
  • PHP version 5.4.38
  • Microsoft SQL Server 2008 Express
  • Microsoft SQL Server 2008 R2 Standard recommended
Web Browsers
  • Microsoft Internet Explorer 9 or later
  • The latest version of Google Chrome
  • The latest version of Mozilla Firefox


  • 512 MB minimum for Windows XP
  • 1 GB minimum for other operating systems
Available Disk Space:
  • 3 GB minimum for Windows XP, Vista, 7, 8, or 8.1
  • 3 GB minimum for Windows Server operating systems
  • Windows Vista Service Pack 1 (32-bit and 64-bit)
  • Windows XP Service Pack 3 (32-bit)
  • Windows 7 (32-bit and 64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows 10 (32-bit and 64 bit)
  • Windows Server 2003 (32-bit and 64-bit)
  • Windows Server 2003 R2 (32-bit and 64-bit)
  • Windows Server 2008 (32-bit and 64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2012 (32-bit and 64-bit)
  • Windows Server 2012 R2 (64-bit)

Gain visibility into data breaches

Endpoint Sensor gives you complete visibility into the attack vector, spread, and extent of impact of a targeted attack.  By providing complete visibility, Incident Response staff can plan for the remediation and prevention of future attacks.

Part of a complete Detection and Response solution

To leverage advanced detection techniques in a stand-alone EDR solution, organizations had to dedicate skilled staff and time to “threat hunting.” We’ve taken a different approach by integrating advanced detection techniques, such as machine learning, behavioral analysis, and application control, into our endpoint protection platform and taking advantage of its automation and remediation capabilities.

This integration gives you complete detection and response with the most automation possible. Protecting beyond the endpoint, the sensor shares threat data with our Deep Discovery network security, leveraging its advanced threat detection capabilities.

Connected Threat Defense

What customers say


"Trend Micro has given us an extra layer of security against advanced and unknown threats. At the same time, having Trend Micro Deep Discovery and Trend Micro Endpoint Sensor means that we have an analysis tool that gives us a much better understanding of how our security system is being challenged." ...more

Peter Mejlby,
Director, Shared Services

More success stories

Read Delacour

success story

Protect more

Protect more

Endpoint Sensor is part of Endpoint Security, powered by XGen™ security, a blend of cross-generational threat defense techniques that protect against targeted attacks, advanced threats, and ransomware.


Learn more