Types of scan responses of Trend Micro Security software
- Solution ID:1104788
- Last Updated:Aug. 21, 2019 12:10 AM (PST)
- Applies to:Antivirus+ Security - 2018, Antivirus+ Security - 2019;Antivirus+ Security - 2020;Internet Security - 2018;Internet Security - 2019;Internet Security - 2020;Maximum Security - 2018;2019;2020;Premium Security - 2018;Premium Security - 2019;Premium Security - 2020;
- Scan Results Definitions | Trend Micro Security
This article helps you learn about the different types of responses that appears on the scan result when the Trend Micro Security software detects an infected file, security threat, or website tracking file.
To know more about the scan results of your Trend Micro program, click on the following information provided below:
To view a detailed scan report, click Show Details after performing a scan:
You can now view the details of the recent scan.
- Cleaned - A security threat was removed from an infected file. For more information about this response, refer to this Knowledge Base article: "Threat Cleaned" message appears from Trend Micro Security software.
- Removed - An infected file with an unremovable security threat or a suspected spyware program was deleted. For more information about this response, refer to this Knowledge Base article: "File Removed" or "Spyware Removed" message appears after a real-time scan.
- Restart required - The scan must restart the computer to finish removing all remnants of the detected security threat. For more information about this response, refer to this Knowledge Base article: "Restart Required" message appears after your Trend Micro Security software detects a threat.
- Access denied - The scan is unable to remove or clean an infected file since the logged-in user account did not have full "read/write" access to where the threat was found (such as a CD-ROM or network drive).
- Open the main console of your Trend Micro program.
- Click the (Settings) icon.
- Uncheck Display a warning after detecting viruses, spyware, or suspicious behavior.
- Click Apply, then click OK.
|Windows Updates Disabled||Microsoft regularly releases updates that fix problems and close security loopholes, so enabling this feature can prevent attackers from taking advantage of known weaknesses.|
|Firewall Protection Disabled||A working firewall helps prevent attackers from sending malicious software or data to your computer, so always keep it enabled.|
|Unsecure Internet Explorer Security Settings||Use this feature to apply the correct settings for Microsoft Internet Explorer and stop deceptive or dangerous websites from causing trouble.|
|User Account Control Settings Too Weak||The Microsoft Windows account system helps limit what software can do, so enable this feature to apply the correct settings and stop malicious programs from causing trouble.|
|Flash Player Update Disabled||Adobe regularly releases updates that fix problems and close security loopholes in their Flash Player used by many websites, so enabling this feature can prevent attackers from taking advantage of known weaknesses.|
|Java Version Outdated
|Oracle regularly releases updates that fix problems and close security loopholes in the Java platform used by many websites, so updating Java can prevent attackers from taking advantage of known weaknesses.|
|Acrobat Reader Version Outdated
|Adobe regularly releases updates that fix problems and close security loopholes in their Adobe Reader, a popular program for reading electronic documents, so updating Adobe Reader can prevent attackers from taking advantage of known weaknesses.|
|Temporary Internet files||Web browsers save local copies of pages that you visit online so that they can display more quickly in the future.|
|Recycle Bin files||Whatever you delete ends up here until you empty the bin.|
|Temporary system files||Windows and other programs may only use some files temporarily. While most programs automatically delete these temporary files, some do not, or else abandon them after encountering problems.|
|Windows Update temporary files||Microsoft operating system updates may leave some unnecessary files behind after finishing.|
|Cookies||Websites use these small text files to identify or authenticate your computer and provide personalized content.|
|Google toolbar search history||Once installed, this toolbar keeps track of the searches you have conducted on the web.|
|Web browser history||Your web browser keeps a record of websites that you have visited to make revisiting them easier.|
|Microsoft Windows and Office||The operating system of your computer and Microsoft productivity software remember which files you have opened before so you can get back to them again more quickly.|
|Media players||Software used to play back audio and video files like Realplayer, Flash player, QuickTime, and the Windows Media Player keep lists of what you have opened|
|Instant messaging||Communications software like Skype, Yahoo!Messenger, and IP Messenger store information about your previous chats.|