Views:

Default Collection

Trend Micro Home Network Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.

Trend Micro Account

DESCRIPTION

The Trend Micro Account allows customer access to the product and to license and support queries.

DATA COLLECTED

Email Address
Password
First Name
Last Name
Country
Phone Number

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Google Firebase
  • AppsFlyer
DESCRIPTION

Trend Micro Home Network Security uses this data to improve product stability, usability, and performance.

Marketing activities are based on this data.

DATA COLLECTED

Management Mobile App Data, including:

  • Device model
  • Operating system version
  • App version
  • App updates

Management App Interactions, including:

  • Number of users and sessions
  • Session duration
  • First launch data
  • App launch data
  • Features usage and operations [events and screens]

ISP carrier name
Location
In-app purchases
In-app status
In-app events
License status

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Amazon Mobile Analytics / Pinpoint
DESCRIPTION

Trend Micro collects this data in order to provide better customer service.

DATA COLLECTED

Management App Interactions, including:

  • Pages viewed
  • Items tapped (buttons, menus, dialogs, etc.)
  • Notifications tapped
  • Pairing time
  • Pairing type (LAN or Cloud pairing)
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Crashlytics
DESCRIPTION

Trend Micro uses this information for troubleshooting.

DATA COLLECTED

Crash Reports, including:

  • App launch & crash times
  • Plain-text class name
  • Exception cause

Management Mobile App data, including:

  • App package name & version
  • OS name & version
  • Device model & CPU
  • Battery level
  • RAM
  • Disk space
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Device Recognition

DESCRIPTION

Device Recognition provides network visibility. We collect a device’s default password only when the login credentials of the administrative console of home network devices, such as IP cameras, match our weak password list. Any default password that is determined to be weak is sent to Trend Micro and a notification is sent through the app to notify the user to change the device’s password. Trend Micro may use the collected information for product/service enhancement, and may conduct statistical analysis for marketing purposes. In addition, we may use the collected data to send useful information via Email or the app.

DATA COLLECTED

Network information, including:

  • Router and Device IP Addresses
  • Ports
  • Protocols
  • MAC Addresses
  • Hostnames
  • UPnP Data
  • WSDD Data
  • MDNS Data

Web Connection Information, including:

  • HTTP Method
  • HTTP User Agent Information
  • HTTP TTL
  • Hashed Domain Name

Device Information, including:

  • Brand
  • Model
  • Manufacturer
  • Platform
  • OS Version
  • Firmware Information
  • Online/Offline Status
  • Device Homepage Data
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Network Usage Report

DESCRIPTION

Network Usage Report lists the network usage of devices.

DATA COLLECTED

App ID
Uploaded Bytes
Downloaded Bytes
Usage Time

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Configurable Features

Trend Micro Home Network Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Member Profile and Device Profile

DESCRIPTION

Member Profile and Device Profile information helps with customer administration of managed devices.

DATA COLLECTED

User-typed Member Name
User-uploaded Image
User-changed Device Information (Brand, Model, Name, Type)

CONSOLE LOCATION

If you do not want this data to be collected, please do not use this feature.

CONSOLE SETTINGS

[Back to top]

Trend Micro Home Network Security Station

DESCRIPTION

Trend Micro collects this data in order to provide better customer service.

DATA COLLECTED

Station Code

CONSOLE LOCATION

Settings

CONSOLE SETTINGS
  • Settings > Help Improve This App

[Back to top]

Send Troubleshooting Logs

DESCRIPTION

Troubleshooting logs help Trend Micro investigate issues in the product.

DATA COLLECTED

Management App Logs
Management Mobile App Information
Station Logs
Network Packets

CONSOLE LOCATION

Settings

CONSOLE SETTINGS
  • Settings > Send Troubleshooting Logs

[Back to top]

Network Security

DESCRIPTION

Disabling Network Security prevents this data from being sent to Trend Micro, but will greatly impact the ability to detect network attacks.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Protocols
CONSOLE LOCATION

Settings > Threat Blocking

CONSOLE SETTINGS
  • Settings > Threat Blocking > Network Protection
  • Settings > Threat Blocking > Internal Attack Blocking

[Back to top]

Web Threat Protection

DESCRIPTION

Disabling Web Threat Protection prevents this data from being sent to Trend Micro, but disabling this setting will greatly impact the ability to detect C&C and malicious activities.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Hostname

Filename/Path
Suspicious Executables and Partial File Content
Hashed Connection Metadata

CONSOLE LOCATION

Settings > Threat Blocking > Web Threat Protection

CONSOLE SETTINGS
  • Settings > Threat Blocking > Web Threat Protection > Dangerous Websites Blocked
  • Settings > Threat Blocking > Web Threat Protection > Dangerous Files Blocked

[Back to top]

Remote Access Protection

DESCRIPTION

Remote Access Protection prevents attackers remotely connecting to devices.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Protocols
CONSOLE LOCATION

Settings > Access Control > Remote Access Protection

CONSOLE SETTINGS
  • Settings > Access Control > Remote Access Protection > Block Remote Access

[Back to top]

Security Check

DESCRIPTION

Security Check identifies known device vulnerabilities. We collect a device’s default password only when the login credentials of the administrative console of home network devices, such as IP cameras, match our weak password list. Any default password that is determined to be weak is sent to Trend Micro and a notification is sent through the app to notify the user to change the device’s password. Trend Micro may use the collected information for product/service enhancement, and may conduct statistical analysis for marketing purposes. In addition, we may use the collected data to send useful information via Email or the app.

DATA COLLECTED

Network information, including:

  • MAC Addresses
  • Hostnames
  • LAN IP Addresses
  • Public Router IP Address to Client
  • Ports
  • Protocols

Device Information, including:

  • OS Version
  • Firmware Information

Device Vulnerability Information, including:

  • CVE Number
  • Vulnerability Detection Request/Response Data
  • Default Device Password
CONSOLE LOCATION

Settings > Device Scan

CONSOLE SETTINGS
  • Settings > Device Scan > Password Check
  • Settings > Device Scan > Vulnerability Check

[Back to top]

Router Access Protection
(Early Access Program feature)

DESCRIPTION

Router Access Protection blocks unauthorized attempts to log into the home router.

DATA COLLECTED

Web Connection Information, including:

  • HTTP Method
  • HTTP URI
  • HTTP User Agent
CONSOLE LOCATION

Settings > Early Access Program

CONSOLE SETTINGS
  • Settings > Early Access Program > Router Access Protection

[Back to top]

Smart Alert
(Early Access Program feature)

DESCRIPTION

Smart Alert analyzes network metadata in order to identify anomalous network behavior.

This feature is not available in all regions.

DATA COLLECTED

Web Connection Information, including:

  • HTTP URI Component: Domain Name (FQDN)
CONSOLE LOCATION

Settings > Early Access Program

CONSOLE SETTINGS
  • Settings > Early Access Program > Smart Alert

[Back to top]

Comments (0)
Add a comment
Home Support

Home Network Security v5.2 Data Collection Disclosure

Default Collection

Trend Micro Home Network Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.

Trend Micro Account

DESCRIPTION

The Trend Micro Account allows customer access to the product and to license and support queries.

DATA COLLECTED

Email Address
Password
First Name
Last Name
Country
Phone Number

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Google Firebase
  • AppsFlyer
DESCRIPTION

Trend Micro Home Network Security uses this data to improve product stability, usability, and performance.

Marketing activities are based on this data.

DATA COLLECTED

Management Mobile App Data, including:

  • Device model
  • Operating system version
  • App version
  • App updates

Management App Interactions, including:

  • Number of users and sessions
  • Session duration
  • First launch data
  • App launch data
  • Features usage and operations [events and screens]

ISP carrier name
Location
In-app purchases
In-app status
In-app events
License status

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Amazon Mobile Analytics / Pinpoint
DESCRIPTION

Trend Micro collects this data in order to provide better customer service.

DATA COLLECTED

Management App Interactions, including:

  • Pages viewed
  • Items tapped (buttons, menus, dialogs, etc.)
  • Notifications tapped
  • Pairing time
  • Pairing type (LAN or Cloud pairing)
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Integrated Modules from Third-party Service Provider:

  • Crashlytics
DESCRIPTION

Trend Micro uses this information for troubleshooting.

DATA COLLECTED

Crash Reports, including:

  • App launch & crash times
  • Plain-text class name
  • Exception cause

Management Mobile App data, including:

  • App package name & version
  • OS name & version
  • Device model & CPU
  • Battery level
  • RAM
  • Disk space
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Device Recognition

DESCRIPTION

Device Recognition provides network visibility. We collect a device’s default password only when the login credentials of the administrative console of home network devices, such as IP cameras, match our weak password list. Any default password that is determined to be weak is sent to Trend Micro and a notification is sent through the app to notify the user to change the device’s password. Trend Micro may use the collected information for product/service enhancement, and may conduct statistical analysis for marketing purposes. In addition, we may use the collected data to send useful information via Email or the app.

DATA COLLECTED

Network information, including:

  • Router and Device IP Addresses
  • Ports
  • Protocols
  • MAC Addresses
  • Hostnames
  • UPnP Data
  • WSDD Data
  • MDNS Data

Web Connection Information, including:

  • HTTP Method
  • HTTP User Agent Information
  • HTTP TTL
  • Hashed Domain Name

Device Information, including:

  • Brand
  • Model
  • Manufacturer
  • Platform
  • OS Version
  • Firmware Information
  • Online/Offline Status
  • Device Homepage Data
CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Network Usage Report

DESCRIPTION

Network Usage Report lists the network usage of devices.

DATA COLLECTED

App ID
Uploaded Bytes
Downloaded Bytes
Usage Time

CONSOLE LOCATION

This feature cannot be disabled.

CONSOLE SETTINGS

[Back to top]

Configurable Features

Trend Micro Home Network Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Member Profile and Device Profile

DESCRIPTION

Member Profile and Device Profile information helps with customer administration of managed devices.

DATA COLLECTED

User-typed Member Name
User-uploaded Image
User-changed Device Information (Brand, Model, Name, Type)

CONSOLE LOCATION

If you do not want this data to be collected, please do not use this feature.

CONSOLE SETTINGS

[Back to top]

Trend Micro Home Network Security Station

DESCRIPTION

Trend Micro collects this data in order to provide better customer service.

DATA COLLECTED

Station Code

CONSOLE LOCATION

Settings

CONSOLE SETTINGS
  • Settings > Help Improve This App

[Back to top]

Send Troubleshooting Logs

DESCRIPTION

Troubleshooting logs help Trend Micro investigate issues in the product.

DATA COLLECTED

Management App Logs
Management Mobile App Information
Station Logs
Network Packets

CONSOLE LOCATION

Settings

CONSOLE SETTINGS
  • Settings > Send Troubleshooting Logs

[Back to top]

Network Security

DESCRIPTION

Disabling Network Security prevents this data from being sent to Trend Micro, but will greatly impact the ability to detect network attacks.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Protocols
CONSOLE LOCATION

Settings > Threat Blocking

CONSOLE SETTINGS
  • Settings > Threat Blocking > Network Protection
  • Settings > Threat Blocking > Internal Attack Blocking

[Back to top]

Web Threat Protection

DESCRIPTION

Disabling Web Threat Protection prevents this data from being sent to Trend Micro, but disabling this setting will greatly impact the ability to detect C&C and malicious activities.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Hostname

Filename/Path
Suspicious Executables and Partial File Content
Hashed Connection Metadata

CONSOLE LOCATION

Settings > Threat Blocking > Web Threat Protection

CONSOLE SETTINGS
  • Settings > Threat Blocking > Web Threat Protection > Dangerous Websites Blocked
  • Settings > Threat Blocking > Web Threat Protection > Dangerous Files Blocked

[Back to top]

Remote Access Protection

DESCRIPTION

Remote Access Protection prevents attackers remotely connecting to devices.

DATA COLLECTED

Web Connection Information, including:

  • IP address
  • Ports
  • Protocols
CONSOLE LOCATION

Settings > Access Control > Remote Access Protection

CONSOLE SETTINGS
  • Settings > Access Control > Remote Access Protection > Block Remote Access

[Back to top]

Security Check

DESCRIPTION

Security Check identifies known device vulnerabilities. We collect a device’s default password only when the login credentials of the administrative console of home network devices, such as IP cameras, match our weak password list. Any default password that is determined to be weak is sent to Trend Micro and a notification is sent through the app to notify the user to change the device’s password. Trend Micro may use the collected information for product/service enhancement, and may conduct statistical analysis for marketing purposes. In addition, we may use the collected data to send useful information via Email or the app.

DATA COLLECTED

Network information, including:

  • MAC Addresses
  • Hostnames
  • LAN IP Addresses
  • Public Router IP Address to Client
  • Ports
  • Protocols

Device Information, including:

  • OS Version
  • Firmware Information

Device Vulnerability Information, including:

  • CVE Number
  • Vulnerability Detection Request/Response Data
  • Default Device Password
CONSOLE LOCATION

Settings > Device Scan

CONSOLE SETTINGS
  • Settings > Device Scan > Password Check
  • Settings > Device Scan > Vulnerability Check

[Back to top]

Router Access Protection
(Early Access Program feature)

DESCRIPTION

Router Access Protection blocks unauthorized attempts to log into the home router.

DATA COLLECTED

Web Connection Information, including:

  • HTTP Method
  • HTTP URI
  • HTTP User Agent
CONSOLE LOCATION

Settings > Early Access Program

CONSOLE SETTINGS
  • Settings > Early Access Program > Router Access Protection

[Back to top]

Smart Alert
(Early Access Program feature)

DESCRIPTION

Smart Alert analyzes network metadata in order to identify anomalous network behavior.

This feature is not available in all regions.

DATA COLLECTED

Web Connection Information, including:

  • HTTP URI Component: Domain Name (FQDN)
CONSOLE LOCATION

Settings > Early Access Program

CONSOLE SETTINGS
  • Settings > Early Access Program > Smart Alert

[Back to top]


Was this helpful?

  • It wasn't helpful at all.
  • It was not helpful.
  • Just okay.
  • It was helpful.
  • It was very helpful.
Messenger Icon
Ask Vanessa

Get in touch with our Social Media ambassador and she'll answer your question or issue.

Hi there  👋

How can we help you today? Click the button below to start chatting with support.

Product Image
Close
Trend Micro Support

Our Support Representative will be with you shortly.

Product Image

Trend Micro Support

Usually replies in a few minutes.

Before we start, kindly fill up the details below:

Please see our privacy policy for more information on how we use your data.