The following sections outline the features that collect data, the data transmitted, and the locations on the product console where you can disable the features.
Worry-Free Business Security Services Console
- Security Agent Installation
- Locate Mobile Device
- Enhanced Threat Analysis / Noteworthy Events
- Threat Investigation for Endpoints
- Threat Investigation for Emails
- User Accounts
- Active Directory Settings
- Smart Feedback
- User Behavior Tracking
- Troubleshooting Settings
Worry-Free Business Security Agent (Windows) Policy Settings
- Smart Scan
- Real-Time Scan
- Scheduled Scan
- Manual Scan
- Scan Exclusion Lists: Real-Time Scan / Scheduled Scan / Manual Scan
- Behavior Monitoring
- Behavior Monitoring: Approved/Blocked Program Lists
- Predictive Machine Learning
- Predictive Machine Learning Exception List
- Vulnerability Protection
- Web Reputation
- Web Reputation: Browser Exploit Prevention
- Firewall
- Endpoint Sensor
- Sample Submission
- Device Control: Users Exception List
- Device Control: Allowed Program List
- Data Loss Prevention
- Data Loss Prevention: Exceptions
- URL Filtering
- Approved / Blocked URL Lists: Web Reputation / URL Filtering
- Application Control
- Trusted Windows Program List
Worry-Free Business Security Agent (Mac) Policy Settings
- Real-Time Scan
- Scheduled Scan
- Manual Scan
- Predictive Machine Learning
- Web Reputation
- URL Filtering
- Approved URL List
- Scan Exclusion Lists
Worry-Free Business Security Agent (Android) Policy Settings
To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.
Worry-Free Business Security Services Console
Security Agent Installation
Worry-Free Business Security Services collects data from user computers or mobile devices to identify an endpoint for administrators.
Data collected |
|
---|---|
Console location |
N/A If you do not want to allow Trend Micro to collect this personal data, do not install the agent program.
|
Console settings |
Locate Mobile Device
Worry-Free Business Security Services collects data from mobile devices to help administrators locate devices remotely.
Data collected | Geo-location |
---|---|
Console location |
Worry-Free Business Security Services Console > Security Agents > Select an Android device > Tasks > Remote Locate |
Console settings |
Remote Locate |
Enhanced Threat Analysis / Noteworthy Events
Worry-Free Business Security Services collects detailed threat events to the server for Enhanced Threat Analysis and Noteworthy Events.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Global Security Agent Settings > Agent Control > Security Agent Logs > Send detailed threat events to the server for Enhanced Threat Analysis |
Console settings |
Send detailed threat events to the server for Enhanced Threat Analysis |
Threat Investigation for Endpoints
Threat Investigation for endpoints can quickly identify potential endpoints for further analysis.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > DETECTION & RESPONSE > Threat Investigation |
Console settings |
Threat Investigation |
Threat Investigation for Emails
Threat Investigation for emails can quickly identify potential email messages for further analysis.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > DETECTION & RESPONSE > Threat Investigation |
Console settings |
Threat Investigation |
User Accounts
User account information includes personal data.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Administration > User Accounts |
Console settings |
User Accounts |
Active Directory Settings
Worry-Free Business Security Services allows administrators to manage Security Agents using the Active Directory (AD) organizational unit (OU) structure. Administrators can set up automatic synchronization with their Active Directory structure using the Trend Micro Common Active Directory Synchronization Tool, or import the Active Directory structure manually.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Administration > Active Directory Settings |
Console settings |
Active Directory Settings |
Smart Feedback
Trend Micro Smart Feedback shares anonymous threat information to the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Administration > Smart Protection Network |
Console settings |
Smart Protection Network |
User Behavior Tracking
Worry-Free Business Security Services collects data from web browsers used to access the Worry-Free Business Security Services web console. The collected data help Trend Micro understand how administrators use the web console and enhance the user experience.
Data collected | Visited URLs on the Worry-Free Business Security Services web console |
---|---|
Console location | N/A |
Console settings |
Troubleshooting Settings
Support engineers for Worry-Free Business Security Services may collect this information during troubleshooting operations to solve issues with Security Agents.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Administration > General Settings |
Console settings |
Worry-Free Business Security Agent (Windows) Policy Settings
Smart Scan
Smart Scan checks the reputation of each file against an extensive in-the-cloud database.
Data collected | File name |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scan Method (Smart Scan is selected) |
Console settings |
Scan Method |
Real-Time Scan
Virus/Malware scanning checks files for known security risks.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Real-Time Scan |
Console settings |
Real-Time Scan |
Scheduled Scan
Virus/Malware scanning checks files for known security risks.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scheduled Scan |
Console settings |
Scheduled Scan |
Manual Scan
Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Manual Scan |
Console settings |
Manual Scan |
Scan Exclusion Lists: Real-Time Scan / Scheduled Scan / Manual Scan
The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Real-Time Scan / Scheduled Scan / Manual Scan.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Real-Time Scan / Scheduled Scan / Manual Scan |
Console settings |
Real-Time Scan / Scheduled Scan / Manual Scan |
Behavior Monitoring
Behavior Monitoring provides a necessary layer of additional threat protection from programs that exhibit malicious behavior.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Behavior Monitoring |
Console settings |
Behavior Monitoring |
Behavior Monitoring: Approved/Blocked Program Lists
The Behavior Monitoring scan exclusion list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically allows all approved programs to run and stops all blocked programs.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Behavior Monitoring |
Console settings |
Behavior Monitoring |
Predictive Machine Learning
Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Predictive Machine Learning |
Console settings |
Predictive Machine Learning |
Predictive Machine Learning Exception List
The Predictive Machine Learning Exception List contains file hashes that the Security Agent does not scan during Predictive Machine Learning scanning.
Data collected | SHA-1 file hash |
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Policy Settings > Global Exception Lists > Malware Scan Exclusions > Predictive Machine Learning Exception List |
Console settings |
Predictive Machine Learning Exception List |
Vulnerability Protection
Vulnerability Protection automates the application of virtual patches before official patches become available.
Data collected |
|
---|---|
Console location |
Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Vulnerability Protection (Preview) |
Console settings |
Vulnerability Protection |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation |
Console settings |
Web Reputation |
Web Reputation: Browser Exploit Prevention
Browser Exploit Prevention identifies web browser exploits and malicious scripts, and prevents the use of these threats from compromising the web browser.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation > Browser Exploit Prevention |
Console settings |
Browser Exploit Prevention |
Firewall
The Firewall blocks or allows certain types of network traffic by creating a barrier between the endpoint and the network.
Data collected | IP address |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Firewall |
Console settings |
Firewall |
Endpoint Sensor
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Threat Investigations to discover hidden threats throughout your network and locate all affected endpoints.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Endpoint Sensor |
Console settings |
Endpoint Sensor |
Sample Submission
Sample Submission enables the Security Agent to detect and send suspicious files that may contain previously unknown threats directly to the Virtual Analyzer for further analysis.
Data collected | Suspicious executable file |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Sample Submission |
Console settings |
Sample Submission |
Device Control: Users Exception List
User rules allow specified users access to restricted devices. The Allow Rules override the endpoint settings.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Users |
Console settings |
Users |
Device Control: Allowed Program List
The Device Control Allowed Program List contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Programs |
Console settings |
Programs |
Data Loss Prevention
Data Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Rules |
Console settings |
Rules |
Data Loss Prevention: Exceptions
The Data Loss Prevention Exception List contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Exceptions |
Console settings |
Exceptions |
URL Filtering
URL Filtering allows administrators to block specific types of websites during different times of the day.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > URL Filtering |
Console settings |
URL Filtering |
Approved / Blocked URL Lists: Web Reputation / URL Filtering
The Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Approved/Blocked URL Lists |
Console settings |
Approved/Blocked URL Lists |
Application Control
Application Control prevents unwanted and unknown applications from executing on your endpoints.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Application Control |
Console settings |
Application Control |
Trusted Windows Program List
The Trusted Windows Program List excludes specified programs and associated processes from Behavior Monitoring, Device Control, and Real-Time Scan.
Data collected | Program path |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Settings > Global Exception Lists > Malware Scan Exclusions > Trusted Windows Program List |
Console settings |
Trusted Windows Program List |
Worry-Free Business Security Agent (Mac) Policy Settings
Real-Time Scan
Virus/Malware scanning checks files for known security risks based on the file operation performed.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Real-Time Scan |
Console settings |
Real-Time Scan |
Scheduled Scan
The specified path or full path list contains directories or full file paths that Mac Security Agent scans during a Scheduled Scan.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Scheduled Scan |
Console settings |
Scheduled Scan |
Manual Scan
Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Manual Scan |
Console settings |
Manual Scan |
Predictive Machine Learning
Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Predictive Machine Learning |
Console settings |
Predictive Machine Learning |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Web Reputation |
Console settings |
Web Reputation |
URL Filtering
URL Filtering allows administrators to block specific types of websites during different times of the day.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > URL Filtering |
Console settings |
URL Filtering |
Approved URL List
The Approved URL List contains URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Approved URLs |
Console settings |
Approved URLs |
Scan Exclusion Lists
The Scan Exclusion Lists contain directories and file extensions that the Mac Security Agent does not scan.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Exclusions |
Console settings |
Scan Exclusions |
Worry-Free Business Security Agent (Android) Policy Settings
Real-Time Malware Scan
Virus/Malware scanning checks files for known security risks based on the file operation performed.
Data collected |
|
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Scan Settings |
Console settings |
Scan Settings |
Web Reputation
Web reputation technology tracks the credibility of web domains accessed by endpoints.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Web Reputation |
Console settings |
Web Reputation |
Approved/Blocked URL Lists
The Approved/Blocked URL Lists contain URLs that the Android Security Agent does not monitor using Web Reputation.
Data collected | URL |
---|---|
Console location | Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Approved/Blocked URLs |
Console settings |
Approved/Blocked URLs |