Trend Micro Endpoint Sensor
Discover, investigate, and respond to attacks on endpoints and servers
Overview:
Gain visibility into data breaches
Endpoint Sensor gives you complete visibility into the attack vector, spread, and extent of impact of a targeted attack. By providing complete visibility, Incident Response staff can plan for the remediation and prevention of future attacks.
Part of a Connected Threat Defense
When Deep Discovery detects advanced malware, Indicators of Compromise (IOC) can be sent to Endpoint Sensor, which searches for infiltration, scans for similar IOCs, and maps the timeline/progression. Suspicious objects are collected and sent to Deep Discovery Analyzer for sandbox analysis. This approach provides complete visibility and control of targeted attacks and ransomware, including its latest variants, such as WannaCry.
Features:
Endpoint event recording
Trend Micro Endpoint Sensor uses a lightweight client to record endpoint activity and communication events at the kernel level. The sensor tracks these events in context across time, providing an in-depth history that can be accessed in real time by analysts.
Rich search parameters
Endpoints can be queried for specific communications, specific malware, registry activity, account activity, running processes, and more. Search inputs can be individual parameters, OpenIOC files, or YARA files.
Works on and off the network
Endpoint Sensor reports and records detailed system-level activities across Windows-based servers, desktops, and laptops regardless of location.
Attack discovery and highlight
Using an XGen™ security blend of cross-generational detection techniques, Endpoint Sensor can search and discover targeted attacks.
Specifications:
Server
Memory |
|
Operating Systems |
|
Microsoft Internet Information Services (IIS) 7 with all of the following role services: |
|
Database |
|
Web Browsers |
|
Agent
Hardware RAM: |
|
Available Disk Space: |
|
Software |
|