To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.
| Product Feature | Data transmitted to Trend Micro | Feature Configuraiton Location | Description |
|---|---|---|---|
| Admission Control |
| This feature cannot be disabled | This information is used to provide security event information. |
| Continuous Compliance |
| This feature cannot be disabled | This information is used to provide security event information. |
| Vulnerability View |
| This feature cannot be disabled | This information is used to understand customer behavior and which public container images most used by them. |
