Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Trend Micro IoT Security 2.1 Data Collection Notice

    • Updated:
    • 1 Jul 2020
    • Product/Version:
    • Trend Micro IoT Security
    • Platform:
    • N/A N/A
Summary

Trend Micro IoT Security (TMIS) provides IoT risk detection and system protection. In order to provide those features, Trend Micro IoT Security automatically analyzes the system libraries and process behaviors in your IoT devices to create baselines that are used to protect IoT devices against network threats.

Default Collection

Configurable Features

To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.

Details
Public

Default Collection

Trend Micro IoT Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these feature. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

E-mail reports

Trend Micro sends email reports that includes collected information from endpoints. Email reports also include an auto-generated password used to open attachments.

Data collected
  • Email address
  • Password (generated by Trend Micro)
  • Endpoint information (including MAC address, IP address, hostname, model name)
Feature Configuration LocationThis feature cannot be disabled

Back to top

Configurable Features

Trend Micro IoT Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Approved Application Listings (AAL)

Provides detection information in email reports.

Data collected
  • Device executable/library information (including path, hash value, permission, system call function name)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “aal” from “feature_set”

Approved Application Listings

Back to top

Hosted IPS

Provides detection information in email reports.

Data collected
  • Device executable/library path
  • Network connection information (including source/destination IP, source/destination port, protocol, direction)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “hips” from “feature_set”

Hosted IPS

Back to top

Web Reputation Services (WRS)

Provide detection information in email reports

Data collected
  • Device executable/library path
  • Network connection information (including source/ destination IP, source/ destination port, protocol, direction, URL)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration

Remove “wrs” from “feature_set”

Web Reputation Services

Back to top

System Vulnerability Scan (SVS)

Provide executable/library vulnerability information in email reports.

Data collected
  • Device executable/library information (including path, name, version)
  • System information (including Linux distribution, kernel version, CPU/memory usage, network interface, open ports)
Feature Configuration Location/etc/opt/atom/atom.json
Configuration
  • Remove “svs” from “feature_set”
  • Set “collect_info” to “false”

System Vulnerability Scan

Back to top

Premium
Internal
Partner
Rating:
Category:
Configure
Solution Id:
1119712
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.