The Anti-Malware module provides both real-time and on-demand protection against file-based threats, including threats commonly referred to as malware, viruses, Trojans, and spyware. To identify threats, Anti-Malware checks files against a comprehensive threat database, portions of which are hosted on servers or kept locally as updatable patterns. Anti-Malware also checks files for certain characteristics, such as compression and known exploit code.
To address threats, Anti-Malware selectively performs actions that contain and remove the threats while minimizing system impact. Anti-Malware can clean, delete, or quarantine malicious files. It can also terminate processes and delete other system objects that are associated with identified threats.
Anti-Malware protects against all kinds of file-based threats, including the following.
Viruses are able to infect normal files by inserting malicious code. Typically, whenever an infected file is opened, the malicious code automatically runs and delivers a payload in addition to infecting other files. Below are some of the more common types of viruses:
Anti-Malware uses different technologies to identify and clean infected files. The most traditional method is to detect the actual malicious code that is used to infect files and strip infected files of this code. Other methods include regulating changes to infectable files or backing up such files whenever suspicious modifications are applied to them.
Non-infectors are malware files that do not have the ability to infect other files. This large set includes the following malware types:
Spyware/grayware comprises applications and components that collect information to be transmitted to a separate system or collected by another application. Spyware/grayware detections, although exhibiting potentially malicious behavior, may include applications used for legitimate purposes such as remote monitoring. Spyware/grayware applications that are inherently malicious, including those that are distributed through known malware channels, are typically detected as other Trojans.
Spyware/grayware applications are typically categorized as:
Although they exhibit what can be intrusive behavior, some spyware-like applications are considered legitimate. For example, some commercially available remote control and monitoring applications can track and collect system events and then send information about these events to another system. System administrators and other users may find themselves installing these legitimate applications. These applications are called "grayware".
To provide protection against the illegitimate use of grayware, Anti-Malware detects grayware but provides an option to "approve" detected applications and allow them to run.
Packers are compressed and/or encrypted executable programs. To evade detection, malware authors often pack existing malware under several layers of compression and encryption. <Malware protection> checks executable files for compression patterns associated with malware.
Files detected as probable malware are typically unknown malware components. By default, these detections are logged and files are anonymously sent back to Trend Micro for analysis.
"Other Threats" includes malware not categorized under any of the malware types. This category includes joke programs, which display false notifications or manipulate screen behavior but are generally harmless.
Vulnerability ProtectionDeep Security performs three kinds of Malware Scans:
A Full Scan runs a full system scan on all processes and files on computer. Full Scans can be run at scheduled times by creating a Scheduled Task for the purpose, or manually (on-demand).
A Quick Scan only scans a computer's critical system areas for currently active threats. A Quick Scan will look for currently active malware but it will not perform deep file scans to look for dormant or stored infected files. On larger drives it is significantly faster than a Full Scan. Quick Scan is only available on-demand. You cannot schedule a Quick Scan as part of a Scheduled Task.
Real-Time Scanning is the ongoing monitoring of running processes and I/O events.
To enable Anti-Malware functionality on a computer:
The scope of Malware Scans can be controlled by editing the Malware Scan Configuration that is in effect on a computer. The Malware Scan Configuration determines which files and directories are included or excluded during a scan and which actions are taken if malware is detected on a computer (for example, clean, quarantine, or delete). There are two types of Malware Scan Configurations:
Manual Scan Configurations or Scheduled Scan Configurations are for Full Scans. Real-Time Scan Configurations are for Real-Time Scanning.
Vulnerability ProtectionDeep Security comes with preconfigured default Malware Scan Configurations for each type of scan. These default Malware Scan Configurations are used in Vulnerability ProtectionDeep Security's preconfigured Security Policies.
To change Malware Scan Configurations:
The following table lists the objects scanned during each type of scan and the sequence in which they are scanned.
| Targets | Full Scan | Quick Scan |
| Drivers | 1 | 1 |
| Trojan | 2 | 2 |
| Process Image | 3 | 3 |
| Memory | 4 | 4 |
| Boot Sector | 5 | - |
| Files | 6 | 5 |
| Spyware | 7 | 6 |
Smart Scan references threat signatures that are stored on Trend Micro servers. When Smart Scan is enabled, Vulnerability ProtectionDeep Security first scans for security risks locally. If Vulnerability ProtectionDeep Security cannot assess the risk of the file during the scan, try to connect to a local Smart Scan Server. If no local Smart Scan Server is detected, they will attempt to connect to the Trend Micro Global Smart Scan Server.
Smart Scan provides the following features and benefits:
To turn Smart Scan on or off, go to Policy/Computer Editor > Anti-Malware > Smart Protection.
Deep Security can apply NSX Security Tags to protected VMs upon detecting a malware threat. NSX Security Tags can be used with NSX Service Composer to automate certain tasks such as quarantining infected VMs. Consult your VMware NSX documentation for more information on NSX Security Tags and dynamic NSX Security Group assignment.
The Anti-Malware and Intrusion Prevention System protection modules can be configured to apply NSX Security Tags.
To configure the Anti-Malware module to apply NSX Security Tags, go to Computer/Policy Editor > Anti-Malware > Advanced > NSX Security Tagging.
You can choose to only apply the NSX Security Tag if the remediation action attempted by the Anti-Malware engine fails. (The remediation action is determined by the Malware Scan Configuration that is in effect. To see which Malware Scan Configuration is in effect, go to the Computer/Policy Editor > Anti-Malware > General tab and check the Real-Time Scan, Manual Scan, and Scheduled Scan areas.)
You can also choose to have the Security Tag removed if a subsequent Malware Scan does not detect any malware. You should only use this setting if all Malware Scans will be of the same kind.