Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Frequently Asked Questions (FAQs) about KeyArmor Antivirus

    • Updated:
    • 17 Feb 2015
    • Product/Version:
    • Endpoint Encryption 3.1 PolicyServer
    • Platform:
    • Windows 2003 Enterprise
Summary

This article answers questions about KeyArmor and antivirus software.

Details
Public

No, with integrated anti-malware detection and remediation, viruses and malicious software are prevented from attacking data transferred and stored on the KeyArmor drive. This is an independent function of KeyArmor, not requiring the existence or utilization of anti-malware from the data source device. KeyArmor provides detailed auditing and logging relating to the anti-malware component, including version control, update integrity, update frequency and file status.

If the files that are being copied over to the KeyArmor device are infected, the KeyArmor anti-virus console detects the infected files and deletes it from the device. Different actions can be taken when an infected file is found by setting a different policy.

No. The KeyArmor does not replace the need for good security practices, such as regular anti-virus and anti-spyware scans, antivirus updates, not sharing passwords, and avoiding websites that you do not trust. KeyArmor protects your data, identity, and privacy—an increasingly necessary tool for today's security-minded consumer.

When KeyArmor has connectivity to the Internet, it connects to the Trend Micro ActiveUpdate site automatically, check for updates, and download the latest signature files. This depends on the policy settings the admin selects. In addition, the first time that a KeyArmor device is used, it will extract and update its virus signature files. This can take up to 5 minutes. Do not remove the KeyArmor during this update.

Furthermore, new threats are constantly surfacing, so even today's best solutions cannot guarantee "future-proof" protection. But since you have the ability to securely update your KeyArmor, you can make sure you have the latest and most secure software and firmware for maximum protection today.

When Key Armor has connectivity to the PolicyServer, any changes are automatically downloaded and enforced. It is transparent to the user.

Key Armor uses Trend Micro antivirus technology to fight malware infections.

Events pertaining to authentication and antivirus activities are logged. The logs are broadcasted to the PolicyServer in an encrypted package to be included in the management reports for any other endpoint devices being monitored via Endpoint Encryption’s solution sets.

Premium
Internal
Rating:
Category:
Configure; Troubleshoot; Deploy; Install; Migrate
Solution Id:
1059915
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.