Customer Example No Internet connection does not mean safe and secure. The source of malware infections is often thought to be the Internet or mail. These really are the main infection routes, so proper security measures are taken for systems connected to the Internet. However, they are in fact exposed to malware infections from USB flash drives and PCs brought in from the outside. In a variety of systems with installed USB interfaces, it can scan and remove malware easily. The features of TMPS2 are as follows: The management program provides the centralized management function.
This enables the comprehension of scan logs of the scanning tools in multiple locations in an integrated fashion. Also, malware pattern files and configurations of the scanning tools can be centrally managed. Moreover, the event log of the lockdown security software "Trend Micro Safe Lock separately charged " can be obtained with the management program of TMPS2.
Scan status and result notification with LED The LED equipped on the scanning tool notifies of the scan status and result with three stages. Since the person in charge does not have to meticulously check the scan status using the target terminal screen, it does not interfere with operational efficiency. Malware scan completed Detected and cleaned Blue: Malware scan completed Malware not detected Using only the scanning tool, malwares can be scanned and removed, and the malware pattern file can be updated.
Updating the malware pattern files and viewing the logs are available using any general-purpose PC connected to the Internet and the scanning tool by selecting a mode that does not use the management program unlike conventional products that require management computers. Security measures are easily enabled even when management computers cannot be prepared separately. After the scan, the drivers and files do not remain on the target terminal.
Updating the malware pattern file Download the latest malware pattern file and scanning engine on the management computer. Periodic downloading is also available by setting up scheduled updates. Management of scanning tool Updated date and time, scanning configurations, and log synchronization date and time can be checked for each scanning tool registered to the management computer.
Also, the configuration for each scanning tool registered to the management computer is available, including target folders, actions at malware detection, and scanning exclusion lists. Centralized management of logs Scan logs can be viewed and managed by sending the scan logs of each location to the management computer from the scanning tool. When malware is detected, cleaned, quarantined, ignored, etc.
The scanned result is saved on the scanning tool. Malware scanning on target terminal Connect the scanning tool to a target terminal to scan for malware and obtain the scan log. Scan status and result notification with LED The LED equipped on the scanning tool notifies of the scan status and result with three stages blue: Updating the malware pattern file When the management computer is being used, downloads the latest malware pattern file from the registered management computer; otherwise, downloads directly from the Trend Micro server.
USB boot scanning 5. Malware infection prevention Protect the scanning tool so that the Trend Micro Portable Security 2 itself is not infected with malware. A log is created on the local hard disk of the target terminal at boot scanning with the Rescue Disk. Example of target terminal PC for specific task, PC for personal information management, PC outside the control of information management brought by a branch, electronic chart system, image processing system, measuring instrument, analytical instrument Use 2: Checking before corporate LAN connection Checks a terminal not connected to a corporate network before connecting to the network Responds to the following requests Want to prevent malware infection in a corporate network Example of target terminal PCs brought out on business trips, PCs for demonstrations, PCs for lending Use 3: Restoration at time of malware infection Checks infected terminals disconnected from the network to restore them.
Check at maintenance service Checks for malware on systems and devices delivered to customers on-site at maintenance Responds to the following requests Want to solve malware infection problems of customers on-site. Want to avoid becoming a cause of malware infection at maintenance. Centralized management type operation centralized management mode that is operated under management program, and scanning tool standalone operation standalone mode that is operated without a management program.
With a management program, the administrator can perform things such as malware scanning configuration and scanning log aggregation to scanning tools in remote branches, production and maintenance sites. When a management program is not used, unlike conventional products that require management computers, updating of malware pattern files and viewing of the log are available using any general-purpose PC connected to the Internet and the scanning tool. Security measures can be easily implemented even when management computers cannot be prepared separately.
Centralized management type operation centralized management mode Suitable for the following demands: Want to aggregate and check logs in the headquarters head office , as TMPS2 is operated in multiple locations Want to unify scanning configurations in multiple locations Want to apply the same malware pattern file in multiple locations Operation image Operation method 2: Scanning tool standalone operation standalone mode Suitable for the following demands: