New in Version 10.6

CPM 10.6 provides the following enhancements over previous versions:

Data Protection

The Data Protection module provides Data Loss Prevention and expands the range of devices monitored by Device Control.

Table 1. Data Protection Features

Data Protection Features

Details

Data Loss Prevention

Data Loss Prevention safeguards an organization’s sensitive information against accidental or deliberate leakage. Data Loss Prevention allows you to:

  • Identify the sensitive information (data identifiers) to protect

  • Create policies that limit or prevent the transmission of data identifiers through common transmission channels, such as email and external devices

  • Enforce compliance to established privacy standards

For more information, see the “Data Protection for CPM Administrator’s Guide”.

Device Control

The Device Control feature regulates access to the following devices:

  • CD/DVDs

  • Floppy disks

  • Network drives

  • USB storage devices

  • Ports (COM and LPT)

  • IEEE 1394 interface

  • Imaging devices

  • Infrared devices

  • Modems

  • PCMCIA cards

  • Print screen key

For more information, see the “Data Protection for CPM Administrator’s Guide”.

Cache Files for Scans

The CPM client now builds cache files, which contain information about safe files that have been scanned previously and files that Trend Micro deems trustworthy. Cache files provide a quick reference during on-demand scans, thus reducing the usage of system resources. On-Demand scans are now more efficient, providing up to 40% improvement to speed performance.

For more information, see Scan Cache Settings (On-Demand Scans Only).

Damage Cleanup Services

Damage Cleanup Services can now run in advanced cleanup mode to stop activities by rogue security software, also known as FakeAV. The client also uses advanced cleanup rules to proactively detect and stop applications that exhibit FakeAV behavior.

You can choose the cleanup mode when you configure virus/malware scan actions for Manual Scan and On-Demand Scan.

For more information, see Damage Cleanup Services.

Web Reputation HTTPS Support

Clients can now scan HTTPS traffic for web threats. You can configure this feature when you create a web reputation policy.

For more information, see Enabling HTTPS Web Reputation on CPM Clients.