Skip to content

OfficeScan - Endpoint Protection

XGen™ endpoint security from the trusted leader

Trend Micro™ OfficeScan™ with XGen™ endpoint security infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilisation.

  • Secure file servers, PCs, Macs, laptops, Point of Sale, ATMs, and virtualised desktops
  • Threat protection with high-fidelity machine learning, behavioural analysis, file reputation, variant protection, web protections, exploit prevention and more
  • Protect against data loss and theft
  • Get real-time updates with local sandbox integration

Maximum XGen™ Security

Infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks.

  • Progressively filters out threats using the most efficient technique for maximum detection without false positives.
  • Blends signature-less techniques including high-fidelity machine learning, behavioral analysis, variant protection, census check, application control, exploit prevention, and good-file check with other techniques like file reputation, web reputation, and command and control (C&C) blocking.
  • Trend Micro is the first to infuse ‘high-fidelity’ machine learning into its approach – uniquely analysing files not only before execution but also during runtime for more accurate detection, with noise cancellation like census and whitelist checking at each layer to reduce false positives.
  • Instantly shares information on suspicious network activity and files with other security layers to stop subsequent attacks.
  • Advanced ransomware protection, monitors for suspicious file encryption activities at the endpoint, terminates malicious activities and even recovers lost files if necessary.

Minimum Impact

Reduce user impact and management costs

  • Lightweight and optimised security uses the right detection technique at the right time to ensure minimal impact on devices and networks.
  • Comprehensive central view of endpoint status lets you quickly get visibility to security risks.
  • Automatic sharing of threat intelligence across security layers enables organisation wide protection of emerging threats.
  • Enable off-premise compliance and protection with the Edge relay that enables employees to work outside the corporate network and still connect to OfficeScan without a VPN.
  • Customisable dashboards to fit different admin responsibilities.
  • 24x7 support means that if a problem arises, Trend Micro is there to resolve it quickly.

Proven Security Partner

Trend Micro has a history of constant innovation to provide the most effective and efficient security technologies. We are always looking ahead to develop the technology needed to fight tomorrow’s ever changing threats.

Customisable endpoint protection

With OfficeScan’s flexible architecture, you can add security services as needed and apply updates quickly and easily.

Check out the modules and complementary products



Get more from your Trend Micro endpoint security with the broadest range of protection, available through optional security modules and complementary endpoint solutions:

Data Loss Prevention (DLP) Module

Protects your sensitive data with integrated DLP for maximum visibility and control.

  • Protects private data on- or off-network, encrypting files before they leave your network
  • Prevents data leaks via cloud storage, USB drives or connected mobile devices, Bluetooth connection, and other media
  • Covers the broadest range of devices, applications, and file types
  • Aids compliance with greater visibility and enforcement

Security for Mac Module

Provides a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X.

  • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware
  • Saves time and effort with centralised management across endpoints, including Macs

Virtual Desktop Infrastructure (VDI) Module

Lets you consolidate your endpoint security into one solution for both physical and virtual desktops.

  • Recognises whether an agent is on a physical or virtual endpoint, and optimises protection and performance for its specific environment
  • Serialises scans and updates, and whitelists base images and previously scanned content to preserve the host resources

Vulnerability Protection

Stops zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.

  • Eliminates risk exposure by shielding vulnerabilities with virtual patching
  • Reduces down-time for recovery and emergency patching
  • Allows patching on your own terms and timelines

Mobile Security Integration

Deploy Trend Micro Mobile Security to extend protection to smart phones and tablets.

  • Integrates OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security
  • Combines mobile device anti-malware, mobile app management, mobile device management (MDM), and data protection in a single solution
  • Enforces policies for data access and protection, passwords, data encryption, and remote lock and wipe

Endpoint Encryption

Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.

  • Protects data at rest with full-disk encryption software
  • Automates data management with self-encrypting hard drives
  • Sets granular policies for device control and data management

Endpoint Application Control

Enhances your defences against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.

  • Protects against users or machines executing malicious software
  • Locks down systems to only the applications that your organisations wants used
  • Uses correlated threat data to maintain an up-to-date database of validated, good applications

Endpoint Sensor Option

Provides context-aware endpoint security monitoring that records and reports detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack.

  • Detects and analyzes your attackers
  • Immediately adapts protection against attack
  • Rapidly responds before sensitive data is lost

Trend Micro™ Control Manager™ Option

This centralised security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premises, cloud, and hybrid deployment models. Centralised management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.


Minimum Recommended Server Requirements

Minimum Recommended Agent Requirements

Agent Operating System:

  • Windows XP (SP3) (x86) Editions
  • Windows XP (SP2) (x64) (Professional Edition)
  • Windows Vista (SP1/SP2) (x86/x64) Editions
  • Windows 7 (with/without SP1) (x86/x64) Editions
  • Windows 8 and 8.1 (x86/x64) Editions
  • Windows 10 (32-bit and 64-bit)
  • Windows 10 IoT Embedded
  • Windows Server 2003 (SP2) and 2003 R2 (x86/x64) Editions
  • Windows Compute Cluster Server 2003 (Active/Passive)
  • Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions
  • Windows Server 2008 (SP2) (x86/x64) and 2008 R2 (SP1) (x64) Editions
  • Windows Storage Server 2008 (SP2) (x86/x64) and Storage Server 2008 R2 (x64) Editions
  • Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64) Editions
  • Windows Server 2008/2008 R2 Failover Clusters (Active/Passive)
  • Windows MultiPoint Server 2010 and 2011 (x64)
  • Windows Server 2012 and 2012 R2 (x64) Editions
  • Windows Storage Server 2012 and 2012 R2 (x64) Editions
  • Windows MultiPoint Server 2012 (x64) Editions
  • Windows Server 2012 Failover Clusters (x64)
  • Windows Server 2016 (x64) Editions
  • Windows XP Embedded Standard (SP1/SP2/SP3) (x86)
  • Windows Embedded Standard 2009 (x86)
  • Windows Embedded POSReady 2009 (x86), Embedded POSReady 7 (x86/x64)
  • Windows 7 Embedded (x86/x64) (SP1)
  • Windows 8 and 8.1 Embedded (x86/x64) Editions

Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1, 10 family)
    • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Vista, Windows Embedded POS, Windows 2008 (x86) family)
    • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 (x64), Windows 2016 family)
  • Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family)
    • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 2008, 2010, 2011, 2012 family)
    • 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows Vista family)
    • 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x86), 8 (x86), 8.1 (x86), Windows Embedded POSReady 7 family)
    • 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x64), 8 (x64), 8.1 (x64) family)
  • Disk Space: 650 MB minimum

Detailed requirements are available online at docs.trendmicro.com


Connect with us on