Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Worry-Free Business Security Services Data Collection Notice

    • Updated:
    • 8 Sep 2020
    • Product/Version:
    • Worry-Free Business Security Services 6.6
    • Worry-Free Business Security Services 6.7
    • Platform:
    • N/A
Summary

The following sections outline the features that collect data, the data transmitted, and the locations on the product console where you can disable the features.

Worry-Free Business Security Services Console

Worry-Free Business Security Agent (Windows) Policy Settings

Worry-Free Business Security Agent (Mac) Policy Settings

Worry-Free Business Security Agent (Android) Policy Settings

To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.

Details
Public

Worry-Free Business Security Services Console

Security Agent Installation

Worry-Free Business Security Services collects data from user computers or mobile devices to identify an endpoint for administrators.

Data collected
  • Host name
  • User name
  • IP address
  • Mac address
  • Agent GUID
  • Mobile number
Console location

N/A

 
If you do not want to allow Trend Micro to collect this personal data, do not install the agent program.
 
Console settings

Back to top

Locate Mobile Device

Worry-Free Business Security Services collects data from mobile devices to help administrators locate devices remotely.

Data collectedGeo-location
Console location

Worry-Free Business Security Services Console Security Agents > Select an Android device > Tasks > Remote Locate

Console settings

Remote Locate

Remote Locate

Back to top

Enhanced Threat Analysis / Noteworthy Events

Worry-Free Business Security Services collects detailed threat events to the server for Enhanced Threat Analysis and Noteworthy Events.

 
The Noteworthy Events feature requires special licensing
 
Data collected
  • Process Information

    • Process image path
    • Process creation time
    • Process owner
    • Process command line
    • Process ID
    • Process image file size
    • Process image file signer
    • Process image file SHA-1
    • Process image file SHA-256
    • Process image file type
  • File Information

    • File path
    • File creation time
    • File modification time
    • File size
    • File signer
    • File SHA-1
    • File SHA-256
    • File type
    • File owner
  • Registry data

    • Registry Key
    • Registry Value Name
  • URL Information

    • URL
    • URL referrer
  • WMI

    • WMI object path
Console location

Worry-Free Business Security Services Console Policies > Global Security Agent Settings > Agent Control > Security Agent Logs > Send detailed threat events to the server for Enhanced Threat Analysis

Console settings

Send detailed threat events to the server for Enhanced Threat Analysis

Send detailed threat events

Back to top

Threat Investigation for Endpoints

Threat Investigation for endpoints can quickly identify potential endpoints for further analysis.

 
This feature requires special licensing.
 
Data collected
  • FQDN / IP address / Host name
  • User name
  • File name
  • File hash value
  • File directory
  • Registry key
  • Registry value name
  • Registry value data
  • CLI command
Console location

Worry-Free Business Security Services Console DETECTION & RESPONSE > Threat Investigation

Console settings

Threat Investigation

Threat Investigation

Back to top

Threat Investigation for Emails

Threat Investigation for emails can quickly identify potential email messages for further analysis.

 
This feature requires special licensing.
 
Data collected
  • Sender address
  • Source IP / Domain
  • Recipient address
  • Subject
  • File name
  • File hash value
  • URL
Console locationWorry-Free Business Security Services Console DETECTION & RESPONSE > Threat Investigation
Console settings

Threat Investigation

Threat Investigation

Back to top

User Accounts

User account information includes personal data.

Data collected
  • Account name
  • Email address
  • User name
Console locationWorry-Free Business Security Services Console Administration > User Accounts
Console settings

User Accounts

User Accounts

Back to top

Active Directory Settings

Worry-Free Business Security Services allows administrators to manage Security Agents using the Active Directory (AD) organizational unit (OU) structure. Administrators can set up automatic synchronization with their Active Directory structure using the Trend Micro Common Active Directory Synchronization Tool, or import the Active Directory structure manually.

Data collected
  • OU GUID
  • OU name
  • OU distinguished name
  • OU last modify time
  • Operating system
Console locationWorry-Free Business Security Services Console Administration > Active Directory Settings
Console settings

Active Directory Settings

User Accounts

Back to top

Smart Feedback

Trend Micro Smart Feedback shares anonymous threat information to the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats.

Data collected
  • File name
  • File path
  • URL
  • Suspicious executable files
Console locationWorry-Free Business Security Services Console Administration > Smart Protection Network
Console settings

Smart Protection Network

Smart Protection Network

Back to top

User Behavior Tracking

Worry-Free Business Security Services collects data from web browsers used to access the Worry-Free Business Security Services web console. The collected data help Trend Micro understand how administrators use the web console and enhance the user experience.

Data collectedVisited URLs on the Worry-Free Business Security Services web console
Console locationN/A
Console settings

Back to top

Worry-Free Business Security Agent (Windows) Policy Settings

Smart Scan

Smart Scan checks the reputation of each file against an extensive in-the-cloud database.

Data collectedFile name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scan Method (Smart Scan is selected)
Console settings

Scan Method

Scan Method

Back to top

Real-Time Scan

Virus/Malware scanning checks files for known security risks.

Data collected
  • File name
  • File path
Console location

Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Real-Time Scan

Console settings

Real-Time Scan

Real-Time Scan

Back to top

Scheduled Scan

Virus/Malware scanning checks files for known security risks.

Data collected
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Scheduled Scan
Console settings

Scheduled Scan

Scheduled Scan

Back to top

Manual Scan

Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.

Data collected
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Settings > Manual Scan
Console settings

Manual Scan

Manual Scan

Back to top

Scan Exclusion Lists: Real-Time Scan / Scheduled Scan / Manual Scan

The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Real-Time Scan / Scheduled Scan / Manual Scan.

Data collected
  • File name
  • Directory path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Real-Time Scan / Scheduled Scan / Manual Scan
Console settings

Real-Time Scan / Scheduled Scan / Manual Scan

Real-Time Scan-Scheduled Scan-Manual Scan

Back to top

Behavior Monitoring

Behavior Monitoring provides a necessary layer of additional threat protection from programs that exhibit malicious behavior.

Data collected
  • URL
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Behavior Monitoring
Console settings

Behavior Monitoring

Behavior Monitoring

Back to top

Behavior Monitoring: Approved/Blocked Program Lists

The Behavior Monitoring scan exclusion list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically allows all approved programs to run and stops all blocked programs.

Data collected
  • File name
  • Full program path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Scan Exclusions > Behavior Monitoring
Console settings

Behavior Monitoring

Behavior Monitoring

Back to top

Predictive Machine Learning

Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.

Data collected
  • URL
  • File name
  • File path
  • Digital signature signer
Console location

Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Predictive Machine Learning

Console settings

Predictive Machine Learning

Predictive Machine Learning

Back to top

Predictive Machine Learning Exception List

The Predictive Machine Learning Exception List contains file hashes that the Security Agent does not scan during Predictive Machine Learning scanning.

Data collectedSHA-1 file hash
Console location

Worry-Free Business Security Services Console > Policies > Policy Settings > Global Exception Lists > Malware Scan Exclusions > Predictive Machine Learning Exception List

Console settings

Predictive Machine Learning Exception List

PML Exception List

Back to top

Vulnerability Protection

Vulnerability Protection automates the application of virtual patches before official patches become available.

Data collected
  • IP address
  • MAC address
  • Application name
Console location

Worry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Vulnerability Protection (Preview)

Console settings

Vulnerability Protection

Vulnerability Protection

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

Web Reputation: Browser Exploit Prevention

Browser Exploit Prevention identifies web browser exploits and malicious scripts, and prevents the use of these threats from compromising the web browser.

Data collected
  • Suspicious or malicious URLs
  • HTTP header/HTML files from suspicious or malicious URLs
  • Browser information
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Web Reputation > Browser Exploit Prevention
Console settings

Browser Exploit Prevention

Browser Exploit Prevention

Back to top

Firewall

The Firewall blocks or allows certain types of network traffic by creating a barrier between the endpoint and the network.

Data collectedIP address
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Firewall
Console settings

Firewall

Firewall

Back to top

Endpoint Sensor

Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Threat Investigations to discover hidden threats throughout your network and locate all affected endpoints.

 
This feature requires special licensing
 
Data collected
  • Command line
  • File name
  • File owner
  • File signer
  • Host name
  • IP address
  • Process owner
  • Registry data
  • User name
  • URL
  • Windows event log
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Endpoint Sensor
Console settings

Endpoint Sensor

Endpoint Sensor

Back to top

Sample Submission

Sample Submission enables the Security Agent to detect and send suspicious files that may contain previously unknown threats directly to the Virtual Analyzer for further analysis.

 
This feature requires special licensing.
 
Data collectedSuspicious executable file
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Sample Submission
Console settings

Sample Submission

Sample Submission

Back to top

Device Control: Users Exception List

User rules allow specified users access to restricted devices. The Allow Rules override the endpoint settings.

Data collected
  • User name
  • Active Directory user account
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Users
Console settings

Users

Users

Back to top

Device Control: Allowed Program List

The Device Control Allowed Program List contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices.

Data collected
  • Program path
  • File name
  • Digital signature provider
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Device Control > Exceptions > Programs
Console settings

Programs

Programs

Back to top

Data Loss Prevention

Data Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information.

Data collected
  • User name
  • Domain
  • Process name
  • Process
  • Source
  • Destination
  • Email sender
  • Email subject
  • Email recipients
  • URL
  • FTP user
  • Rule name
  • Forensic data
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Rules
Console settings

Rules

Rules

Back to top

Data Loss Prevention: Exceptions

The Data Loss Prevention Exception List contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type.

Data collected
  • IP address
  • Endpoint name
  • FQDN
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Data Loss Prevention > Exceptions
Console settings

Exceptions

Exceptions

Back to top

URL Filtering

URL Filtering allows administrators to block specific types of websites during different times of the day.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > URL Filtering
Console settings

URL Filtering

URL Filtering

Back to top

Approved / Blocked URL Lists: Web Reputation / URL Filtering

The Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Approved/Blocked URL Lists
Console settings

Approved/Blocked URL Lists

Approved-Blocked URL Lists

Back to top

Application Control

Application Control prevents unwanted and unknown applications from executing on your endpoints.

Data collected
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Windows > Application Control
Console settings

Application Control

Application Control

Back to top

Trusted Windows Program List

The Trusted Windows Program List excludes specified programs and associated processes from Behavior Monitoring, Device Control, and Real-Time Scan.

Data collectedProgram path
Console locationWorry-Free Business Security Services Console > Policies > Policy Settings > Global Exception Lists > Malware Scan Exclusions > Trusted Windows Program List
Console settings

Trusted Windows Program List

Trusted Windows Program List

Back to top

Worry-Free Business Security Agent (Mac) Policy Settings

Real-Time Scan

Virus/Malware scanning checks files for known security risks based on the file operation performed.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Real-Time Scan
Console settings

Real-Time Scan

Real-Time Scan

Back to top

Scheduled Scan

The specified path or full path list contains directories or full file paths that Mac Security Agent scans during a Scheduled Scan.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Scheduled Scan
Console settings

Scheduled Scan

Scheduled Scan

Back to top

Manual Scan

Virus/Malware scanning checks files for known security risks based on an on-demand scan started from the Security Agents screen or the Security Agent console.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Settings > Manual Scan
Console settings

Manual Scan

Manual Scan

Back to top

Predictive Machine Learning

Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.

Data collected
  • URL
  • File name
  • File path
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Predictive Machine Learning
Console settings

Predictive Machine Learning

Predictive Machine Learning

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

URL Filtering

URL Filtering allows administrators to block specific types of websites during different times of the day.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > URL Filtering
Console settings

URL Filtering

URL Filtering

Back to top

Approved URL List

The Approved URL List contains URLs that the Security Agent does not monitor using Web Reputation / URL Filtering.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Approved URLs
Console settings

Approved URLs

Approved URLs

Back to top

Scan Exclusion Lists

The Scan Exclusion Lists contain directories and file extensions that the Mac Security Agent does not scan.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Mac > Scan Exclusions
Console settings

Scan Exclusions

Scan Exclusions

Back to top

Worry-Free Business Security Agent (Android) Policy Settings

Real-Time Malware Scan

Virus/Malware scanning checks files for known security risks based on the file operation performed.

Data collected
  • File path
  • File name
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Scan Settings
Console settings

Scan Settings

Scan Settings

Back to top

Web Reputation

Web reputation technology tracks the credibility of web domains accessed by endpoints.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Web Reputation
Console settings

Web Reputation

Web Reputation

Back to top

Approved/Blocked URL Lists

The Approved/Blocked URL Lists contain URLs that the Android Security Agent does not monitor using Web Reputation.

Data collectedURL
Console locationWorry-Free Business Security Services Console > Policies > Policy Management > Configure Policy > Android > Approved/Blocked URLs
Console settings

Approved/Blocked URLs

Approved-Blocked URLs

Back to top

Premium
Internal
Partner
Rating:
Category:
Configure
Solution Id:
1122449
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.