A security toolkit that can analyze your computer in order to detect viruses and other threat types that might affect its functionality.
- Trend Micro Anti-Threat Toolkit
- Version :22.214.171.1244
- License :Freeware
- OS :Windows All
- Publisher :Trend Micro
Trend Micro Anti-Threat Toolkit Description
Without proper real-time protection from a reliable security solution your computer and the data stored on it are at risk, especially if you are an active Internet user. The Trend Micro Anti-Threat Toolkit aims to quickly detect viruses and other types of malware located on your system, helping you remove all malicious files in one click.
Collect information and send it to the Trend Micro team
The toolkit is made up of multiple installers, including online and offline ones. As you might imagine, the first is dedicated to computers that are connected to the Internet, while the second can be used in the absence of an Internet connection.
In addition to this, it also includes ‘Quick Collector’, a simple command-line application that can analyze your system in detail and create a report (in the form of a ZIP archive, located in the same directory where Quick Collector is executed) that you can submit to the Trend Micro technical support for analysis.
Scan your PC for viruses and other malicious files
Working with Trend Micro Anti-Threat Toolkit shouldn’t pose any problem, thanks to its wizard-like interface and intuitive layout.
There are three scan modes that you can use: the quick scan targets the most important areas of the system, whereas the full scan analyzes the entire computer. The custom scan mode enables you to choose the directory to process.
The application provides the Trend Micro Smart Feedback function, which allows real-time information about your computer to be sent to the Smart Protection Network, so as to improve detection rate.
Detect and remove threats from your computer
Trend Micro Anti-Threat Toolkit comes in handy to all users who want to make sure that their computer is not infected. What’s more important, it can be used alongside a permanent security solution, providing an extra security layer to your system.