Views:

Default Collection

Trend Micro Antivirus+ Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

Google Analytics

DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Installation

DESCRIPTION

The data is used for troubleshooting when there is an installation error and to improve user experience.

DATA COLLECTED

Product Debug Logs
IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

License Management

DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED

Password
Email address
First name
Last name
Computer name
IP address
Mac address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Active Update

DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED

IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Error Log Auto Feedback

DESCRIPTION

We use this data to troubleshoot customers' problems.

DATA COLLECTED

Product debug logs and dumps
System information
Windows system event logs
IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]

Protect Another Device Feedback

DESCRIPTION

The data is used for Protect Another Device to let users know which detected devices are protected by Trend Micro products.

DATA COLLECTED

MAC address
Gateway BSSID and MAC address
IP address
Hostname
Device brand and model

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Detection DB

DESCRIPTION

The data is used for Security Report to let user know the detection records and product settings of the user’s registered devices.

DATA COLLECTED

URL
Malware detection records
Product settings

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please do not install the program on your device.

CONSOLE SETTINGS

[Back to top]

Configurable Features

Trend Micro Antivirus+ Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Smart Protection Network

DESCRIPTION

We process the data to improve the usability of our products.

DATA COLLECTED

Share threat information with Trend Micro controls the data collected by the following features:

Trend Micro Toolbar
Manual Scan / Schedule Scan
Realtime Scan
Active Monitor
Web Threat Protection
Browser Exploit Prevention
Firewall Booster
Anti Spam Toolbar
All malware detection records
Secure Erase - deleted filename
Wi-Fi Advisor
- detected ap name
- ap ID
- ap MAC
- NIC ID
- NIC name
- NIC MAC

CONSOLE LOCATION

Main Console > Other Settings > Smart Protection Network

CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    User Behavior and Smart Protection Network

[Back to top]

Real-time Scan

Scan for threats when opening, saving, or downloading files

DESCRIPTION

Data is collected to build a knowledge base to enhance detection rate and reduce false alarms.

DATA COLLECTED

File name
File path
IP address
Original URL
Suspicious files
Task scheduler
WMI information

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Scan for threats when opening, saving, or downloading files

    Scan threats when opening, saving, or downloading files

[Back to top]

Enable machine-learning to protect from new or unknown threats

DESCRIPTION

Data collected for machine-learning is used to identify if a file is malicious and fine tune our engine logics and pattern definitions.

DATA COLLECTED

File name
File path
URL
Path

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Enable machine-learning to protect from new or unknown threats

    Enable machine-learning to protect from new or unknown threats

[Back to top]

Back up files encrypted or modified by suspicious programs

DESCRIPTION

We collect this data to improve our solutions and provide reports to customers.

DATA COLLECTED

Restored file name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Back up files encrypted or modified by suspicious programs

    Back up files encrypted or modified by suspicious programs

[Back to top]

Active Monitoring

DESCRIPTION

Active Monitoring monitors system activity in real time and takes action when activity of a program violates a policy.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

Registry key
Registry value
URL
File name
File path
IP address
Original URL

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Check if programs try to make unauthorized changes to system settings that could threaten your security

    Check if programs try to make unauthorized changes to system settings that could threaten your security

[Back to top]

Web Threat Protection

DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

IP address
URL
File name
File path
Original URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites.

    Block potentially dangerous websites

[Back to top]

Browser Exploit Prevention

DESCRIPTION

Analyzes malicious URLs and malicious scripts in web pages.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

    Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

[Back to top]

Firewall Booster

DESCRIPTION

Data collected by Firewall Booster is used to increase the accuracy and detection rate of each pattern rule.

DATA COLLECTED

Source IP and port number
Destination IP and port number

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Network

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Network > Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

    Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

[Back to top]

Protect Another Device

DESCRIPTION

The data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED

Gateway BSSID
Gateway Mac address
Mac address
IP address
Bluetooth name and address
Host name
Computer name and ID

CONSOLE LOCATION
  • Welcome Page
  • Main Console > Device > Protect Another Device > Choose
  • Main Console > Protect Another Device > Scan your network to find devices
CONSOLE SETTINGS
  • OPTION 1: Welcome Page

    Welcome Page

  • OPTION 2: Choose a Device
    Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • OPTION 3: Scan your network to find your device
    Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • OPTION 4: Try to find your device again
    Main Console > Protect Another Device > Scan your network to find devices > Scan Results > Try again

    Protect Another Device - Try again

    Protect Another Device - Try again

  • Popups:

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]

Trend Micro Toolbar

DESCRIPTION

The data is collected so that Trend Micro can analyze these URLs to check their safety.

DATA COLLECTED

Unrated URL
IP address

CONSOLE LOCATION
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure
  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure
CONSOLE SETTINGS
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure > Turn ON or Turn OFF Privacy Scanner

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure > Turn ON or Turn OFF Social Networking Protection

    Trend Micro Toolbar - Configure

    Enable Social Networking Protection

[Back to top]

Manual Scan/ Scheduled Scan

DESCRIPTION

Manual and Scheduled Scans are used to detect threats on users' devices.

Data is collected to improve threat detection and generate scan reports.

To opt-out of data collection, users should not scan their devices.

DATA COLLECTED

File name and full path
IP address
Original URL
Detected program name/path

CONSOLE LOCATION
  • Manual Scan:
    • Main Console > Arrow Icon
    • Trend Micro Shortcut > Scan Now
    • Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans
CONSOLE SETTINGS
  • Manual Scan:
    • OPTION 1: Main Console > Arrow Icon > Quick Scan / Full Scan / Custom Scan

      Manual Scan - Scan Dropdown

    • OPTION 2: Trend Micro Shortcut > Scan Now

      Manual Scan - Scan Now

    • OPTION 3: Dropdown Menu

      Manual Scan - Dropdown Menu

  • Scheduled Scan: Main Console > Settings > Scheduled Scans > Conduct a scheduled scan of the computer

    Scheduled Scan - Conduct a scheduled scan of the computer

[Back to top]

Support Tool

DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED

Debug logs from Trend Micro products
Modules
System information
Device name
Account name
File path
Detected suspicious files

Add a comment