Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Advantages of the Smart Scan pattern over the conventional pattern protection in OfficeScan (OSCE)

    • Updated:
    • 17 Oct 2016
    • Product/Version:
    • OfficeScan 10.6
    • OfficeScan 11.0
    • OfficeScan XG.All
    • Platform:
    • Windows 2003 Enterprise Server
    • Windows 2003 Small Business Server
    • Windows 2003 Standard Server Edition
    • Windows 2008 Enterprise Server
    • Windows 2008 Essential Business Server
    • Windows 2008 Small Business Server
    • Windows 2008 Standard Server Edition
    • Windows 2012 Enterprise
    • Windows 7 32-bit
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Professional
Summary

This article provides information on why you should switch to Smart Scanning.

Details
Public

Below are the methods for client scanning:

Conventional Scan

This method is being utilized in the previous versions of OfficeScan. Client that uses this method stores all the components on the client computer and scans all the files locally.

Smart Scan

This method uses threat signatures stored in the cloud. The client scans for security risks in the local files first before connecting to the local Smart Scan Server. If the client is unable to connect, it will try to connect to the Trend Micro Global Smart Scan Server.

Trend Micro strongly recommends switching from Conventional Scanning to Smart Scanning due to the following reasons:

  • Recent statistics shows that the Smart Scan Agent pattern (OTH, which is stored locally on the actual agent that uses Smart Scanning) covers 80% of the total threats, and that the Smart Scan pattern (TBL, stored on the Scan Server) covers the other 20%.
  • Aside from Smart Scan Agent pattern (icrc$oth.xxx), a local cache is used to reduce about 80% of outgoing queries. CRC cache works as a partial Smart Scan Pattern replica so that previously obtained CRC can be reused later. In other words, the CRCs are ready to be used to protect an endpoint user and are effective on malware that have been previously detected. However, the date may vary among individual users according to their usage behavior.
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1055837
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.