Views:
Registration
DescriptionThe service uses the information to:
  • Identify users
  • Assign an ID to the company (The ID is embedded in the Endpoint Assessment Tool package.)
  • Send status updates
  • Generate email and endpoint reports
Data collected
  • First name
  • Last name
  • Email address
  • Phone number
  • Company
  • Number of employees
  • Job title
  • Country
Console locationRegistration page
Console settings
  • Click Sign Up.

Registration

Back to top


Email Assessment (Office 365)
DescriptionThe service needs permission to access mailboxes for scanning. Trend Micro does not access and store users’ Office 365 credentials.

Email Assessment combines machine learning, document exploit detection, and behavior analysis to protect Exchange Online users from BEC, ransomware, advanced phishing, and other high-profile attacks.

Data collected
  • Azure Active Directory: Domain, user, and group information
  • Exchange Online: Mailbox information
  • Global administrator email address used to grant permissions to the Assessment Service
  • Email senders
  • Email recipients
  • Email locations
  • Email subjects
  • Email attachments
  • File modifiers
  • File locations
  • File names
  • URLs in email body
  • URLs in email attachments
  • URLs in files
  • Suspicious executable files and scripts in cloud storage services
  • Suspicious executable files and scripts in email attachments
  • Metadata of suspicious executable files and scripts in cloud storage services
  • Metadata of suspicious executable files and scripts in email attachments
  • IP addresses of upstream MTAs for IP rating query
  • Domain, user, device and group information in Azure Active Directory
Console locationAt-Risk Cloud Mailbox Assessment
Console settings
  • Click Start Assessment.
  • Select Office 365.

Office 365

Back to top


Email Assessment (Google Workspace)
DescriptionThe service needs permission to access mailboxes for scanning. Trend Micro does not access and store users’ Google Workspace credentials.

Email Assessment combines machine learning, document exploit detection, and behavior analysis to protect Exchange Online users from BEC, ransomware, advanced phishing, and other high-profile attacks.

Data collected
  • Domain, user, and group information
  • Global administrator email address for Gmail
  • Email senders
  • Email recipients
  • Email locations
  • Email subjects
  • Email attachments
  • File modifiers
  • File locations
  • File names
  • URLs in email body
  • URLs in email attachments
  • URLs in files
  • Suspicious executable files and scripts in cloud storage services
  • Suspicious executable files and scripts in email attachments
  • Metadata of suspicious executable files and scripts in cloud storage services
  • Metadata of suspicious executable files and scripts in email attachments
  • IP addresses of upstream MTAs for IP rating query
  • Domain, user, device and group information in Azure Active Directory
Console locationt-Risk Cloud Mailbox Assessment
Console settings
  • Click Start Assessment.
  • Select Google Workspace.

Google Workspace

Back to top


Endpoint Assessment (Windows)
DescriptionThe assessment tool scans Windows endpoints for malicious files, critical vulnerabilities, and threat indicators collected from global intelligence sources. After collecting system information, the tool automatically uploads the data to the service for in-depth analysis and reporting.
Data collected
  • Host name
  • Endpoint name
  • IP address
  • MAC address
  • File name
  • File path
  • Unpatched critical vulnerabilities
Console location

At-Risk Endpoint Assessment

Console settingslick Start Assessment.

Select Windows.

Windows

Back to top


Endpoint Assessment (macOS)
Description

The assessment tool scans macOS endpoints for file-based threat, network detection and operation system possible security risks. After collecting system information, the tool automatically uploads the data to the service for in-depth analysis and reporting.

Data collected
  • Installed Apps primary executable attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • Active process's image file attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • All persistent items files attributes: file path, file hash, create time, owner use name, file mode, code sign status
  • Installed applications, active processes, and persistent processes:
    • File path
    • File hash value
    • Time created
    • User name of owner
    • File permission
    • Code signing status
  • All suspicious network connections basic information:
    • Source IP address/port
    • Destination IP address/port
    • Relating process information
  • Suspicious connections:
    • Source IP address and port
    • Destination IP address and port
    • Related process information
  • Operating system:
    • Version
    • macOS user account
    • Status of key security features
Console locationAt-Risk Endpoint Assessment
Console settings
  • Click Start Assessment.
  • Select macOS.

macOS

Back to top


Trend Vision One Risk Assessment
DescriptionRisk Insights allows you to quickly assess the cloud access activities and vulnerabilities related to users and devices, and to determine how to mitigate the risks found in your network.
Data collectedSee Risk Insights section of the Trend Vision One Data Collection Notice.
Console location

Trend Vision One Risk Assessment

Console settings
  • Click Start Trial.

Risk Assessment

Back to top


Phishing Simulation Assessment

Trend Vision One Phishing Simulation Assessment includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.

Creating a campaign - Uploading Recipients
DescriptionCustomers can upload the list of recipients in the following ways.
  • CSV file
  • 3rd party data source
  • Manual data entry
Data Transmitted to Trend Micro
  • Name
  • Email Address
  • Department (optional)
  • Location (optional)
Feature Configuration LocationLog on to Trend Vision One -> Click Assessments -> Phishing Simulation -> Step 2

Create a Campaign (Phishing Simulation)

Campaign Interactions
DescriptionWhen the employee receives the phishing simulation email they may:
  • Click on the link and enter data on our simulated phishing webpages
  • We will store the username, and the password is not stored
Data Transmitted to Trend Micro
  • Username
Feature Configuration LocationUsername is collected from our simulated phishing landing pages.

Campaign Interaction

Back to top