Views:

Default Collection

Trend Micro Maximum Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

Google Analytics

DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Installation

DESCRIPTION

The data is used for troubleshooting when there is an installation error and to improve user experience.

DATA COLLECTED

Product Debug Logs
IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

License Management

DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED

Password
Email address
First name
Last name
Computer name
IP address
Mac address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Active Update

DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED

IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Error Log Auto Feedback

DESCRIPTION

We use this data to troubleshoot customers' problems.

DATA COLLECTED

Product debug logs and dumps
System information
Windows system event logs
IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Protect Another Device Feedback

DESCRIPTION

The data is used for Protect Another Device to let users know which detected devices are protected by Trend Micro products.

DATA COLLECTED

MAC address
Gateway BSSID and MAC address
IP address
Hostname
Device brand and model

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Detection DB

DESCRIPTION

The data is used for Security Report to let user know the detection records and product settings of the user’s registered devices.

DATA COLLECTED

URL
Malware detection records
Product settings

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Configurable Features

Trend Micro Maximum Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Smart Protection Network

DESCRIPTION

We process the data to improve the usability of our products.

DATA COLLECTED

Share threat information with Trend Micro controls the data collected by the following features:

Trend Micro Toolbar
Manual Scan / Schedule Scan
Realtime Scan
Active Monitor
Web Threat Protection
Browser Exploit Prevention
Firewall Booster
Anti Spam Toolbar
All malware detection records
Secure Erase - deleted filename
Wi-Fi Advisor
- detected ap name
- ap ID
- ap MAC
- NIC ID
- NIC name
- NIC MAC

CONSOLE LOCATION

Main Console > Other Settings > Smart Protection Network

CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    User Behavior and Smart Protection Network

[Back to top]

PC Health Checkup & User Behavior

DESCRIPTION

We use this data to optimize customers' devices performance and design new features to provide additional help to our customers.

DATA COLLECTED

MAC address
Filenames
System information
Product settings
IP address
Browser setting
Installed applications
Running processes
Product UI shown
User interaction with product UI

CONSOLE LOCATION
  • Main Console > Settings > PC Health Checkup
  • Main Console > Other Settings > Smart Protection Network
CONSOLE SETTINGS
  • Main Console > Settings > PC Health Checkup.

    PC Health Checkup

  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro

    Share computer performance information with Trend Micro

[Back to top]

Real-time Scan

Scan for threats when opening, saving, or downloading files

DESCRIPTION

Data is collected to build a knowledge base to enhance detection rate and reduce false alarms.

DATA COLLECTED

File name
File path
IP address
Original URL
Suspicious files
Task scheduler
WMI information

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Scan for threats when opening, saving, or downloading files

    Scan threats when opening, saving, or downloading files

[Back to top]

Enable machine-learning to protect from new or unknown threats

DESCRIPTION

Data collected for machine-learning is used to identify if a file is malicious and fine tune our engine logics and pattern definitions.

DATA COLLECTED

File name
File path
URL
Path

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Enable machine-learning to protect from new or unknown threats

    Enable machine-learning to protect from new or unknown threats

[Back to top]

Back up files encrypted or modified by suspicious programs

DESCRIPTION

We collect this data to improve our solutions and provide reports to customers.

DATA COLLECTED

Restored file name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Back up files encrypted or modified by suspicious programs

    Back up files encrypted or modified by suspicious programs

[Back to top]

Active Monitoring

DESCRIPTION

Active Monitoring monitors system activity in real time and takes action when activity of a program violates a policy.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

Registry key
Registry value
URL
File name
File path
IP address
Original URL

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Check if programs try to make unauthorized changes to system settings that could threaten your security

    Check if programs try to make unauthorized changes to system settings that could threaten your security

[Back to top]

Web Threat Protection

DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

IP address
URL
File name
File path
Original URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites.

    Block potentially dangerous websites

[Back to top]

Browser Exploit Prevention

DESCRIPTION

Analyzes malicious URLs and malicious scripts in web pages.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

    Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

[Back to top]

Firewall Booster

DESCRIPTION

Data collected by Firewall Booster is used to increase the accuracy and detection rate of each pattern rule.

DATA COLLECTED

Source IP and port number
Destination IP and port number

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Network

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Network > Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

    Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

[Back to top]

Protect Another Device

DESCRIPTION

The data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED

Gateway BSSID
Gateway Mac address
Mac address
IP address
Bluetooth name and address
Host name
Computer name and ID

CONSOLE LOCATION
  • Welcome Page
  • Main Console > Device > Protect Another Device > Choose
  • Main Console > Protect Another Device > Scan your network to find devices
CONSOLE SETTINGS
  • OPTION 1: Welcome Page

    Welcome Page

  • OPTION 2: Choose a Device
    Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • OPTION 3: Scan your network to find your device
    Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • OPTION 4: Try to find your device again
    Main Console > Protect Another Device > Scan your network to find devices > Scan Results > Try again

    Protect Another Device - Try again

    Protect Another Device - Try again

  • Popups:

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]

Trend Micro Toolbar

DESCRIPTION

The data is collected so that Trend Micro can analyze these URLs to check their safety.

DATA COLLECTED

Unrated URL
IP address

CONSOLE LOCATION
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure
  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure
CONSOLE SETTINGS
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure > Turn ON or Turn OFF Privacy Scanner

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure > Turn ON or Turn OFF Social Networking Protection

    Trend Micro Toolbar - Configure

    Enable Social Networking Protection

[Back to top]

Manual Scan/ Scheduled Scan

DESCRIPTION

Manual and Scheduled Scans are used to detect threats on users' devices.

Data is collected to improve threat detection and generate scan reports.

To opt-out of data collection, users should not scan their devices.

DATA COLLECTED

File name and full path
IP address
Original URL
Detected program name/path

CONSOLE LOCATION
  • Manual Scan:
    • Main Console > Arrow Icon
    • Trend Micro Shortcut > Scan Now
    • Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans
CONSOLE SETTINGS
  • Manual Scan:
    • Manual Scan:
      • OPTION 1: Main Console > Arrow Icon > Quick Scan / Full Scan / Custom Scan
      • OPTION 2: Trend Micro Shortcut > Scan Now
      • OPTION 3: Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans > Conduct a scheduled scan of the computer

[Back to top]


Support Tool
DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED

Debug logs from Trend Micro products
Modules
System information
Device name
Account name
File path
Detected suspicious files

CONSOLE LOCATION
  • Support Tool Console - For debug log collection in Tab (A) Debug
  • Support Tool Console - For malicious log collection in Tab (B) Threats
CONSOLE SETTINGS
  • Support Tool Console - For debug log collection in Tab (A) Debug:
    Users can choose to automatically send log data to Trend Micro.
  • Support Tool Console - For malicious log collection in Tab (B) Threats:

[Back to top]


Single Password
DESCRIPTION

Password data is used to allow customers to access their Trend Micro products settings and Vault.

To opt-out of data collection, users should not set up password protection.

DATA COLLECTED

Email address
Single password

CONSOLE LOCATION

Main Console > Settings > Other Settings > Password

CONSOLE SETTINGS
  • Main Console > Settings > Other Settings > Password > Enable password protection to prevent unauthorized changes

[Back to top]


Anti Spam Toolbar
DESCRIPTION

Email data is used for Mail Phishing Score.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Spam emails
Emails reported by users as not spam

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Spam & Emailed Files

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Spam & Emailed Files > Filter out unsolicited advertisements and other unwanted email messages from your Outlook inbox.

[Back to top]


Fraud Buster
DESCRIPTION

Email data is used for Scam mail and malicious mail detection.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Email Sender
Email Subject
Email Content

CONSOLE LOCATION

Trend Micro Toolbar

CONSOLE SETTINGS
  • Enable Fraud Buster
  • Security Scan
  • Check Evidence

[Back to top]

Add a comment
Home Support

Trend Micro Maximum Security v16.0 Data Collection Disclosure

Default Collection

Trend Micro Maximum Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

Google Analytics

DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Installation

DESCRIPTION

The data is used for troubleshooting when there is an installation error and to improve user experience.

DATA COLLECTED

Product Debug Logs
IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

License Management

DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED

Password
Email address
First name
Last name
Computer name
IP address
Mac address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Active Update

DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED

IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Error Log Auto Feedback

DESCRIPTION

We use this data to troubleshoot customers' problems.

DATA COLLECTED

Product debug logs and dumps
System information
Windows system event logs
IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Protect Another Device Feedback

DESCRIPTION

The data is used for Protect Another Device to let users know which detected devices are protected by Trend Micro products.

DATA COLLECTED

MAC address
Gateway BSSID and MAC address
IP address
Hostname
Device brand and model

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Detection DB

DESCRIPTION

The data is used for Security Report to let user know the detection records and product settings of the user’s registered devices.

DATA COLLECTED

URL
Malware detection records
Product settings

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Configurable Features

Trend Micro Maximum Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Smart Protection Network

DESCRIPTION

We process the data to improve the usability of our products.

DATA COLLECTED

Share threat information with Trend Micro controls the data collected by the following features:

Trend Micro Toolbar
Manual Scan / Schedule Scan
Realtime Scan
Active Monitor
Web Threat Protection
Browser Exploit Prevention
Firewall Booster
Anti Spam Toolbar
All malware detection records
Secure Erase - deleted filename
Wi-Fi Advisor
- detected ap name
- ap ID
- ap MAC
- NIC ID
- NIC name
- NIC MAC

CONSOLE LOCATION

Main Console > Other Settings > Smart Protection Network

CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    User Behavior and Smart Protection Network

[Back to top]

PC Health Checkup & User Behavior

DESCRIPTION

We use this data to optimize customers' devices performance and design new features to provide additional help to our customers.

DATA COLLECTED

MAC address
Filenames
System information
Product settings
IP address
Browser setting
Installed applications
Running processes
Product UI shown
User interaction with product UI

CONSOLE LOCATION
  • Main Console > Settings > PC Health Checkup
  • Main Console > Other Settings > Smart Protection Network
CONSOLE SETTINGS
  • Main Console > Settings > PC Health Checkup.

    PC Health Checkup

  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro

    Share computer performance information with Trend Micro

[Back to top]

Real-time Scan

Scan for threats when opening, saving, or downloading files

DESCRIPTION

Data is collected to build a knowledge base to enhance detection rate and reduce false alarms.

DATA COLLECTED

File name
File path
IP address
Original URL
Suspicious files
Task scheduler
WMI information

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Scan for threats when opening, saving, or downloading files

    Scan threats when opening, saving, or downloading files

[Back to top]

Enable machine-learning to protect from new or unknown threats

DESCRIPTION

Data collected for machine-learning is used to identify if a file is malicious and fine tune our engine logics and pattern definitions.

DATA COLLECTED

File name
File path
URL
Path

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Enable machine-learning to protect from new or unknown threats

    Enable machine-learning to protect from new or unknown threats

[Back to top]

Back up files encrypted or modified by suspicious programs

DESCRIPTION

We collect this data to improve our solutions and provide reports to customers.

DATA COLLECTED

Restored file name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Back up files encrypted or modified by suspicious programs

    Back up files encrypted or modified by suspicious programs

[Back to top]

Active Monitoring

DESCRIPTION

Active Monitoring monitors system activity in real time and takes action when activity of a program violates a policy.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

Registry key
Registry value
URL
File name
File path
IP address
Original URL

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Check if programs try to make unauthorized changes to system settings that could threaten your security

    Check if programs try to make unauthorized changes to system settings that could threaten your security

[Back to top]

Web Threat Protection

DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

IP address
URL
File name
File path
Original URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites.

    Block potentially dangerous websites

[Back to top]

Browser Exploit Prevention

DESCRIPTION

Analyzes malicious URLs and malicious scripts in web pages.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

    Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

[Back to top]

Firewall Booster

DESCRIPTION

Data collected by Firewall Booster is used to increase the accuracy and detection rate of each pattern rule.

DATA COLLECTED

Source IP and port number
Destination IP and port number

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Network

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Network > Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

    Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

[Back to top]

Protect Another Device

DESCRIPTION

The data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED

Gateway BSSID
Gateway Mac address
Mac address
IP address
Bluetooth name and address
Host name
Computer name and ID

CONSOLE LOCATION
  • Welcome Page
  • Main Console > Device > Protect Another Device > Choose
  • Main Console > Protect Another Device > Scan your network to find devices
CONSOLE SETTINGS
  • OPTION 1: Welcome Page

    Welcome Page

  • OPTION 2: Choose a Device
    Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • OPTION 3: Scan your network to find your device
    Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • OPTION 4: Try to find your device again
    Main Console > Protect Another Device > Scan your network to find devices > Scan Results > Try again

    Protect Another Device - Try again

    Protect Another Device - Try again

  • Popups:

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]

Trend Micro Toolbar

DESCRIPTION

The data is collected so that Trend Micro can analyze these URLs to check their safety.

DATA COLLECTED

Unrated URL
IP address

CONSOLE LOCATION
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure
  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure
CONSOLE SETTINGS
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure > Turn ON or Turn OFF Privacy Scanner

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure > Turn ON or Turn OFF Social Networking Protection

    Trend Micro Toolbar - Configure

    Enable Social Networking Protection

[Back to top]

Manual Scan/ Scheduled Scan

DESCRIPTION

Manual and Scheduled Scans are used to detect threats on users' devices.

Data is collected to improve threat detection and generate scan reports.

To opt-out of data collection, users should not scan their devices.

DATA COLLECTED

File name and full path
IP address
Original URL
Detected program name/path

CONSOLE LOCATION
  • Manual Scan:
    • Main Console > Arrow Icon
    • Trend Micro Shortcut > Scan Now
    • Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans
CONSOLE SETTINGS
  • Manual Scan:
    • Manual Scan:
      • OPTION 1: Main Console > Arrow Icon > Quick Scan / Full Scan / Custom Scan
      • OPTION 2: Trend Micro Shortcut > Scan Now
      • OPTION 3: Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans > Conduct a scheduled scan of the computer

[Back to top]


Support Tool
DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED

Debug logs from Trend Micro products
Modules
System information
Device name
Account name
File path
Detected suspicious files

CONSOLE LOCATION
  • Support Tool Console - For debug log collection in Tab (A) Debug
  • Support Tool Console - For malicious log collection in Tab (B) Threats
CONSOLE SETTINGS
  • Support Tool Console - For debug log collection in Tab (A) Debug:
    Users can choose to automatically send log data to Trend Micro.
  • Support Tool Console - For malicious log collection in Tab (B) Threats:

[Back to top]


Single Password
DESCRIPTION

Password data is used to allow customers to access their Trend Micro products settings and Vault.

To opt-out of data collection, users should not set up password protection.

DATA COLLECTED

Email address
Single password

CONSOLE LOCATION

Main Console > Settings > Other Settings > Password

CONSOLE SETTINGS
  • Main Console > Settings > Other Settings > Password > Enable password protection to prevent unauthorized changes

[Back to top]


Anti Spam Toolbar
DESCRIPTION

Email data is used for Mail Phishing Score.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Spam emails
Emails reported by users as not spam

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Spam & Emailed Files

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Spam & Emailed Files > Filter out unsolicited advertisements and other unwanted email messages from your Outlook inbox.

[Back to top]


Fraud Buster
DESCRIPTION

Email data is used for Scam mail and malicious mail detection.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Email Sender
Email Subject
Email Content

CONSOLE LOCATION

Trend Micro Toolbar

CONSOLE SETTINGS
  • Enable Fraud Buster
  • Security Scan
  • Check Evidence

[Back to top]


Was this helpful?

  • It wasn't helpful at all.
  • It was not helpful.
  • Just okay.
  • It was helpful.
  • It was very helpful.
Messenger Icon
Ask Vanessa

Get in touch with our Social Media ambassador and she'll answer your question or issue.

Hi there!  👋

How can we help you today? Click the button below to start chatting with support.

Product Image
Close
Trend Micro Support

Our Support Representative will be with you shortly.

Product Image

Trend Micro Support

Usually replies in a few minutes.

Before we start, kindly fill up the details below:

Please see our privacy policy for more information on how we use your data.