Views:

Registration

The service uses the information to:

  • Identify users
  • Assign an ID to the company (The ID is embedded in the Endpoint Assessment Tool package.)
  • Send status updates
  • Generate email and endpoint reports
Data collected
  • First name
  • Last name
  • Email address
  • Phone number
  • Company
  • Number of employees
  • Job title
  • Country
Console location

Registration page

Console settings
  • Click Sign Up.

Registration

Back to top

Email Assessment (Office 365)

The service needs permission to access mailboxes for scanning. Trend Micro does not access and store users’ Office 365 credentials.

Email Assessment combines machine learning, document exploit detection, and behavior analysis to protect Exchange Online users from BEC, ransomware, advanced phishing, and other high-profile attacks.

Data collected
  • Azure Active Directory: Domain, user, and group information
  • Exchange Online: Mailbox information
  • Global administrator email address used to grant permissions to the Assessment Service
  • Email senders
  • Email recipients
  • Email locations
  • Email subjects
  • Email attachments
  • File modifiers
  • File locations
  • File names
  • URLs in email body
  • URLs in email attachments
  • URLs in files
  • Suspicious executable files and scripts in cloud storage services
  • Suspicious executable files and scripts in email attachments
  • Metadata of suspicious executable files and scripts in cloud storage services
  • Metadata of suspicious executable files and scripts in email attachments
  • IP addresses of upstream MTAs for IP rating query
  • Domain, user, device and group information in Azure Active Directory
Console location

At-Risk Cloud Mailbox Assessment

Console settings
  • Click Start Assessment.
  • Select Office 365.

Office 365

Back to top

Email Assessment (Google Workspace)

The service needs permission to access mailboxes for scanning. Trend Micro does not access and store users’ Google Workspace credentials.

Email Assessment combines machine learning, document exploit detection, and behavior analysis to protect Exchange Online users from BEC, ransomware, advanced phishing, and other high-profile attacks.

Data collected
  • Domain, user, and group information
  • Global administrator email address for Gmail
  • Email senders
  • Email recipients
  • Email locations
  • Email subjects
  • Email attachments
  • File modifiers
  • File locations
  • File names
  • URLs in email body
  • URLs in email attachments
  • URLs in files
  • Suspicious executable files and scripts in cloud storage services
  • Suspicious executable files and scripts in email attachments
  • Metadata of suspicious executable files and scripts in cloud storage services
  • Metadata of suspicious executable files and scripts in email attachments
  • IP addresses of upstream MTAs for IP rating query
  • Domain, user, device and group information in Azure Active Directory
Console location

At-Risk Cloud Mailbox Assessment

Console settings
  • Click Start Assessment.
  • Select Google Workspace.

Google Workspace

Back to top

Endpoint Assessment (Windows)

The assessment tool scans Windows endpoints for malicious files, critical vulnerabilities, and threat indicators collected from global intelligence sources. After collecting system information, the tool automatically uploads the data to the service for in-depth analysis and reporting.

Data collected
  • Host name
  • Endpoint name
  • IP address
  • MAC address
  • File name
  • File path
  • Unpatched critical vulnerabilities
Console location

At-Risk Endpoint Assessment

Console settings

Click Start Assessment.

Select Windows.

Windows

Back to top

Endpoint Assessment (macOS)

The assessment tool scans macOS endpoints for file-based threat, network detection and operation system possible security risks. After collecting system information, the tool automatically uploads the data to the service for in-depth analysis and reporting.

Data collected
  • Installed Apps primary executable attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • Active process's image file attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • All persistent items files attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • Installed applications, active processes, and persistent processes:
    • File path
    • File hash value
    • Time created
    • User name of owner
    • File permission
    • Code signing status
  • All suspicious network connections basic information:
    • Source IP address/port
    • Destination IP address/port
    • Relating process information
  • Suspicious connections:
    • Source IP address and port
    • Destination IP address and port
    • Related process information
  • Operating system:
    • Version
    • macOS user account
    • Status of key security features
Console location

At-Risk Endpoint Assessment

Console settings
  • Click Start Assessment.
  • Select macOS.

macOS

Back to top

Trend Micro Vision One Risk Assessment

Zero Trust Risk Insights allows you to quickly assess the cloud access activities and vulnerabilities related to users and devices, and to determine how to mitigate the risks found in your network.

Data collected

See Zero Trust Risk Insights.

Console location

Trend Micro Vision One Risk Assessment

Console settings
  • Click Start Trial.

Risk Assessment

Back to top