Views:

Default Collection

Trend Micro IoT Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these feature. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

E-mail reports

  • Email address: As the recipient of email reports.
  • Password: A Trend Micro-generated password used to protect the attachments of email reports.
  • Endpoint device information: To provide device information in email reports.
Data collected
  • Email address
  • Password (generated by Trend Micro)
  • Endpoint device information (including MAC address, IP address, hostname, model name)
Feature Configuration LocationThis feature cannot be disabled.

Back to top

Management tool

  • Email address: As the user account used to log into the management tool.
  • Password: A Trend Micro-generated password used to log into the management tool.
Data collected
  • Email address
  • Password (generated by Trend Micro)
Feature Configuration LocationThis feature cannot be disabled.

Back to top

Configurable Features

Trend Micro IoT Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Approved Application Listings (AAL)

Provides detection information in email reports.

Data collected
  • Device executable/library information (including path, hash value, permission, system call function name)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “aal” from “feature_set”

Approved Application Listings

Back to top

Hosted IPS

Provides detection information in email reports.

Data collected
  • Device executable/library path
  • Network connection information (including source/destination IP, source/destination port, protocol, direction)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “hips” from “feature_set”

Hosted IPS

Back to top

Web Reputation Services (WRS)

Provide detection information in email reports

Data collected
  • Device executable/library path
  • Network connection information (including source/ destination IP, source/ destination port, protocol, direction, URL)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “wrs” from “feature_set”

Web Reputation Services

Back to top

System Vulnerability Scan (SVS)

Provide executable/library vulnerability information in email reports.

Data collected
  • Device executable/library information (including path, name, version)
  • System information (including Linux distribution, kernel version, CPU/memory usage, network interface, open ports)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration
  • Remove “svs” from “feature_set”
  • Set “collect_info” to “false”

System Vulnerability Scan

Back to top