Views:

General Product Operation

Server & Workload Protection, by design, does not collect personal information. When a security event occurs, information about the event is transferred to Trend Micro. Depending on the nature of the protected environment and the object that is the target of the security event (for example, files, memory, network traffic) there is a risk that personal information may be collected within a security event. Security policy configuration and module selection are provided to meet the requirements of your target environment and minimize this risk. The default event retention period for Server & Workload Protection is 32 days.

General Product Operation (Modules)
Data CollectedSecurity event information:
  • Anti-Malware
    • For cloud query:
      • File path
    • For detection log:
      • File name
      • File path
      • Suspicious process data
      • Container information
      • User name
      • Domain
      • Full process path
    • For exclusion list:
      • File path
      • File directory
      • Full file path
    • For uploaded files:
      • Quarantined file
  • Web Reputation
    • For cloud query:
      • URL
      • IP address
      • Endpoint name
      • User name
    • For prevention of browser exploitation:
      • Suspicious URLs
      • HTTP headers or HTML files from suspicious URLs
      • Browser information
    • For exclusion list:
      • URL
      • Domain
      • Keyword
  • Device Control
    • For detection log:
      • Target file
      • Process accessing device
      • USB device
        • Device type
        • Name
        • Vendor
        • Model
        • Serial number
    • For exclusion list:
      • Name
      • Vendor
      • Model
      • Serial number
  • Application Control
    • For detection log:
      • Rule name
      • RuleSet name
      • File name
      • File path
      • Number of repetitions
      • User name
      • User ID
      • Process name
      • Process ID
    • For exclusion list:
      • Full update or installer program path
      • File name
      • File path
  • Firewall
    • For custom rules:
      • Rule name
      • Rule description
      • Rule configuration
    • For detection log:
      • Rule name
      • Interface
      • Source IP address
      • Source port
      • Source MAC address
      • Destination IP address
      • Destination port
      • Destination MAC address
  • Intrusion Prevention
    • For custom rules:
      • Rule name
      • Rule description
      • Rule configuration
    • For detection log:
      • Rule name
      • Interface
      • Source IP address
      • Source Port
      • Source MAC address
      • Destination IP address
      • Destination Port
      • Destination MAC address
      • Suspicious process data
      • Container information
      • Packet data
  • Integrity Monitoring
    • For custom rules:
      • Rule name
      • Rule description
      • Rule configuration (FileSet, DirectorySet, ServiceSet, UserSet, GroupSet, PortSet, Processes,
        RegistryKeySet, RegistryValueSet, WQLSet)
    • For detection log:
      • Rule name
      • Rule modification
      • Rule description
      • Process name
      • User name
  • Log Inspection
    • For custom rules:
      • Rule name
      • Rule description
      • Rule configuration
      • Decoder name
      • Decoder description
      • Decoder configuration
    • For detection log:
      • Rule name
      • Rule description
      • Group
      • Location
      • Source IP address
      • Source port
      • Destination IP address
      • Destination port
      • Protocol
      • Action
      • Source user
      • Destination user
      • Event
      • Host name
      • Original event
      • ID
      • Status
      • Command
      • URL
      • Data
      • System name
      • Associated rule
      • Event origin
Console LocationComputer or Policy editor > Select module (e.g. Anti-Malware, Web Reputation, etc)
Console SettingsState: Off or Inherited (Off)

Module state

General Product Operation (Event Forwarding)
Data CollectedSecurity event information:
  • Intrusion prevention packet
  • URL reputation
  • Firewall packet
  • Log entry
  • Malware file
  • IP addresses
  • Mobile and USB device blocked logs
Console LocationAdministration > System Settings > Event Forwarding
Console Settings
  • Forward System Events to a remote computer (via Syslog) using configuration
  • Publish Events to AWS Simple Notification Service

Module state

General Product Operation (Logging and Monitoring)
Data CollectedData from AWS ELB and other logs, including:
  • Names
  • Email addresses
  • Session IDs
  • IP addresses
  • CloudWatch logs
  • Server0 entries
  • HTTP traffic
Console LocationThis information is stored in the Server & Workload Protection SIEM and is used for troubleshooting, monitoring, and overall protection of the system. It cannot be configured or disabled by customer.

Contact Email

Server & Workload Protection transmits reports, alerts, and registration confirmation to its email server when sending this information to customers.

Email Configuration (Contacts)
Data Collected
  • Reports
  • Alerts
  • Registration confirmation
Console LocationAdministration > User Management > Contacts
Console SettingsEmail Address

Module state

This contact information will show up when configuring Scheduled Reports under Generate Reports.

Module state

Endpoint Management

Trend Micro Endpoint Basecamp
DescriptionTrend Micro Endpoint Basecamp is a lightweight agent that serves as the control & deployment & upgrade channel for Trend Vision One Endpoint Security.
 
If you do not want to allow Trend Micro to collect these data items, do not install the agent program.
 
Data Collected
  • Endpoint GUID
  • Endpoint name
  • Endpoint IP address
  • MAC address
Console LocationNot configurable using the web console
Trend Vision One Endpoint Security Telemetry Agent
DescriptionTrend Vision One Endpoint Security Telemetry Agent helps Trend Micro gather diagnostic telemetry for proactively identify technical issues for better improving the stability and performance of Trend Vision One Endpoint Security.
 
If you do not want to allow Trend Micro to collect these data items, do not install the agent program.
 
Data Collected
  • Endpoint GUID
  • IP Address
  • File name/path*
  • Process name/path*
  • Vision One Endpoint Security program file versions
  • Vision One Endpoint Security program settings
  • Vision One Endpoint Security performance data
  • Windows file versions
  • Windows performance data

*Some of the collected information may contain Personally Identifiable Information (PII).

Console LocationNot configurable using the web console

Endpoint Sensor

Trend Vision One Endpoint Sensor: Attack Surface Discovery
DescriptionAttack Surface Discovery collects detail operating system configuration and installed applications metadata periodically to perform risk assessment and present the risk event & score in Risk Insights.
Data Collected
  • Endpoint GUID
  • OS SKU, detail version & patch history
  • Installed Application records
  • Registry data
Console LocationEndpoint Security Operations > Endpoint Inventory
Console SettingsNot configurable using the web console
Trend Vision One Endpoint Sensor: Detection and Response
DescriptionTrend Vision One Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and correlation with threat intel, you can perform effective investigations to discover hidden threats throughout your network, locate all affected endpoints, and remediate swiftly.
Data Collected
  • Endpoint GUID
  • Endpoint name
  • IP address
  • User name
  • Process command line
  • Process owner
  • File name & full path
  • File owner
  • File signer
  • URL
  • Registry data
  • Windows event log
Console LocationEndpoint Security Operations > Endpoint Inventory
Console Settings

Module state

Trend Vision One Endpoint Sensor: Advanced Risk Telemetry
DescriptionAdvanced Risk Telemetry helps to identify attack surfaces including vulnerabilities related to 3rd party applications more accurately and timely on top of regular Attack Surface Discovery.
Data Collected
  • Endpoint GUID
  • Process command line
  • Service metadata
  • File name & full path
Console LocationEndpoint Security Operations > Endpoint Inventory
Console Settings

Module state

Intrusion Prevention and Firewall

DescriptionYou can optionally configure Server & Workload Protection to use a Whois service to look up which domain name is associated with an IP address when you review logged intrusion prevention and firewall events. The IP address is sent directly to the Whois service and not to Trend Micro.
Data Collected
  • IP addresses
Console LocationAdministration > System Settings > Advanced
Console SettingsWhois URL

Module state

Anti-Malware: Smart Protection

DescriptionSmart Protection Server for File Reputation Service is used by the anti-malware module. It supplies file reputation information required by Smart Scan. Alternatively, you can use a locally installed Smart Protection Server.
Data Collected
  • Product information
  • Client device OS
  • Malicious or suspicious file information
  • Suspicious file signatures
  • Malicious or suspicious process information
Console LocationComputer or Policy editor > Anti-Malware > Smart Protection
Console SettingsConnect directly to Global Smart Protection Service

Module state

Anti-Malware: Process Memory Scan

DescriptionProcess Memory Scan connects to the Good File Reputation Service. This information enables Server & Workload Protection to identify good file hashes.
Data Collected
  • File hashes (SHA1)
Console LocationPolicies > Common Object > Other > Malware Scan Configurations > Real-Time Scan configuration > General
Console SettingsScan process memory for malware

Module state

Anti-Malware: Predictive Machine Learning

DescriptionPredictive Machine Learning enables identification of potential malicious files.
Data Collected
  • For cloud query:
    • File name
    • File path
    • Digital signer
    • Process data
  • For detection log:
    • File name
    • File path
    • Suspicious process data
    • Container information
    • User name
    • Domain
    • Full process path
  • For exclusion list:
    • File path
    • File directory
    • Full file path
  • For uploaded files:
    • Quarantined files
Console LocationPolicies > Common Objects > Other > Malware Scan Configurations > Real-Time Scan configuration > General
Console SettingsEnable Predictive Machine Learning

Module state

Anti-Malware: Smart Scan

DescriptionThis information is sent when a file scan occurs and enables Server & Workload Protection to identify malicious file hashes.
Data Collected
  • File hashes (CRC)
Console LocationComputer or policy editor > Anti-Malware > Smart Protection > Smart Scan
Console SettingsUntick Inherited check box (if it's selected) and select Off.

Module state

Anti-Malware: Behavior Monitoring

DescriptionThe behavior monitoring feature communicates with the Global Census Server and Good File Reputation Service. This enables Server & Workload Protection to identify good file hashes and to retrieve statistical data.
Data Collected
  • For cloud query:
    • File path
  • For detection log:
    • File name
    • File path
    • Suspicious process data
    • Container information
    • User name
    • Domain
    • Full process path
  • For exclusion list:
    • Full program path
  • For uploaded files:
    • Quarantined files
Console LocationPolicies > Common Objects > Other > Malware Scan Configuration > Real-Time Scan configuration > General
Console Settings
  • Detect suspicious activity and unauthorized changes (incl. ransomware)
  • Back up and restore ransomware-encrypted files

Module state

Anti-Malware: Identified (Quarantined) Files

DescriptionAn identified file is a file that has been found to be or to contain malware and has therefore been encrypted and moved to a special folder on the protected computer. Identified files are not sent to Server & Workload Protection unless you specifically download them using the actions described below.
Data Collected
  • Files that have been identified as potential malware
Console LocationEvents & Reports > Events > Anti-Malware Events > Identified Files
Console SettingsThe file is sent to Server & Workload Protection only if you select it and click Download.

Integrity Monitoring

DescriptionYou can configure Server & Workload Protection to automatically tag integrity monitoring events. If you select the Certified Safe Software Service option, information is sent to the Trend Micro Certified Safe Software service. Alternatively, you can select one of the other options when configuring auto tagging, or don’t enable auto-tagging.
Data Collected
  • File hashes (SHA1) and additional information
Console LocationEvents and Reports > Integrity Monitoring Events > Auto-Tagging > New Trusted Source
Console SettingsCertified Safe Software Service

Module state

Web Reputation

DescriptionThe web reputation module uses the Trend Micro Smart Protection Network to determine whether URLs are malicious. When Connect directly to Global Smart Protection Service is selected, URLs are sent to Trend Micro. Alternatively, you can opt to use a locally installed Smart Protection Server. You must select one of these options to use the web reputation module. If you don’t want to use either of those options, go to the General tab and change the Web Reputation State to Off to disable the web reputation module.
Data Collected
  • URL
Console LocationComputer or Policy editor > Web Reputation > Smart Protection
Console SettingsConnect directly to Global Smart Protection Service

Module state

Activity Monitoring

DescriptionActivity Monitoring is a protection policy that enables security-related activity to be sent to Trend Micro XDR, providing effective expert analytics and global threat intelligence using data collected across multiple vectors - email, endpoints, servers, cloud workloads, and networks.
Activity Monitoring data is only sent to Trend Micro if the server has the Activity Monitoring policy assigned and state of the policy is On.
Data Collected
  • Tenant GUID
  • Account name
  • Process activity
  • File activity
  • Network activity
  • Registry activity (Windows only)
  • Connection activity
  • Domain query activity
  • User account activity (Windows only)
  • Modified process activity
  • Memory activity
  • Behavior monitoring activity
Console LocationComputer or Policy editor > Activity Monitoring > General > Activity Monitoring State: On
Console Settings

Module state

Data Center Gateway Registration

DescriptionWhen you register a new Data Center Gateway on Server & Workload Protection, an identifiable name and optional description will be collected for future reference. The information that you provided may or may not refer to your data-center name or its location.
Data Center Gateway is required only for deployments that Add a VMware vCenter accounts to Cloud One Workload Security. https://cloudone.trendmicro.com/docs/workload-security/vcenter-add/
Data Collected
  • Data Center Gateway Name
  • Data Center Gateway Description
Console LocationSystem Settings > Data Center Gateway > New
Console Settings

Module state

VMware vCenter Registration

DescriptionWhen you add a VMware vCenter account on Server & Workload Protection, the following data is stored and encrypted in order to synchronize the virtual machine data from vCenter servers.
Data Collected
  • vCenter Server Address
  • vCenter Server Port
  • vCenter Credential
Console LocationComputers > Add
Console Settings

Module state

VMware vCenter Synchronization

DescriptionServer & Workload Protection periodically synchronizes the virtual machine metadata from VMware vCenter via the Data Center Gateway. During this process the Data Center Gateway collects the following information for general product operation as well as analytics.
Data Collected
  • For Data Center Gateways
    • IP addresses
    • Hostname
  • For vCenter servers
    • vCenter UUID (Moref)
    • vCenter version
    • vCenter build
    • Custom fields
  • For virtual machines
    • Name
    • Parent
    • Hardware devices
    • vApp Configs
    • vmtool status
    • IP address
    • Network config
    • Hostname
    • Parent vApp
    • Resource pool
    • Runtime power state
    • Runtime boot time
    • Runtime suspend time
    • Annotation
    • Instance uuid
    • Memory size in mb
    • Number of cpu
    • UUID
    • Custom value
  • For host systems (ESXI)
    • Name
    • Parent
    • Network configuration
    • Kernel module system
    • Kernel module patch
    • Hardware
    • Summary
    • Custom value
  • For DataCenter
    • Name
    • Parent
    • hostFolder
    • vmFolder
  • For vApp Folder
    • Name
    • Parent
    • Parent folder
  • For Compute Resource, Folder, Resource pool, Data store
    • Name
    • Parent
Console LocationIP Address of the Data Center Gateway will not be displayed in the console or any customer facing location For the rest, will be shown in Computers page.
Console Settings

Module state

Module state

Module state

Module state

Active Directory Registration

DescriptionAdd an Active Directory connector in Server & Workload Protection to synchronize computer data from the domain. The data collected is encrypted and stored.
Data Collected
  • Active Directory Server Address
  • Active Directory Server Port
  • The username and password of a domain user which used to fetch data from Active Directory Server
Console LocationComputers > Add
Console Settings

Module state

Module state

Active Directory Synchronization

DescriptionServer & Workload Protection periodically synchronizes the computers' metadata from Active Directory via the Data Center Gateway. During this process, the Data Center Gateway collects the following information for general product operation and analytics.
Data Collected
  • For Data Center Gateways
    • IP addresses
    • Hostname
  • For Domain Controller
    • DistinguishedName
  • For Computers
    • Name
    • DistinguishedName
    • Hardware devices
    • IP address
    • Network config
    • Hostname
    • Runtime power state
    • Runtime boot time
    • Runtime suspend time
    • BIOS UUID
    • Object GUID
Console LocationThe IP address of the Data Center Gateway will not be displayed in the console, or in any customer facing location. The rest of the collected data will be viewable from the Computers page.
Console Settings

Module state

Module state

Module state

Anti-Malware Module: Agent Metrics Collection and Analytics Service

DescriptionThe Agent metrics are collected to understand how the agent is performing in a particular environment.
Based on the "Top N" data described below, Trend Micro can provide a suitable exclusion lists to mitigate possible performance issues.
Data Collected
  • Top N Scanned Files - File paths that are scanned the most
Console LocationThis is automatically collected via agent metrics and cannot be disabled.

Network Module: Agent Metrics Collection and Analytics Service

DescriptionThe Agent metrics are collected to understand how the agent is performing in a particular environment.
Based on the data collection below, Trend Micro can provide better Intrusion Prevention and Firewall support for the most popular connection invokers.
Data Collected
  • Process Command Line - command line that process used to set up the connection
  • Process Executable Path - file path of the process that set up the connection
  • Process Name - file name of the process that set up this connection
Console LocationThis is automatically collected via agent metrics and cannot be disabled.

Smart Feedback

DescriptionSmart Feedback enables you to participate, share, and leverage Trend Micro’s global database of threat-related intelligence to rapidly identify and defend against potential threats within your unique network environment.
Smart Feedback is enabled by default for new customers.
Data Collected
  • Host name
  • IP address 
  • File name
  • File path
  • Suspicious file content
  • Industry
  • Country
Console LocationAdministration > System Settings > Smart Feedback
Console SettingsTo disable Trend Micro Smart Feedback, uncheck the Enable Trend Micro Smart Feedback checkbox.

Module state