Trend Micro

Trend Micro Early Warning Service

A quick and easy way to determine if your organization is under attack

WHO is eligible?

If you are a Trend Micro Apex One™ as a Service, Trend Micro Apex One™ on-premises, Trend Micro™ OfficeScan™ XG SP1, or Trend Micro™ Deep Security™ Manager customer, you can scan your environment for specific indicators to determine if your organization is under a particular attack.

WHAT does it offer?

The early warning service scans for indicators of compromise (IoC) related to a notable targeted attack. Currently, this service focuses on the individual campaign: Kaseya VSA. You can check if you’re affected and learn more about how to protect your company.

The scan results are presented in Trend Micro Vision One™, and will specify if any indicators of the specific attack were found, what endpoints were affected, and recommended actions.

If interested, you can also employ XDR capabilities on 10% of your licensed endpoints straight from the console to experience enhanced detection and investigation capabilities—FREE.


­If you would like information on previous campaigns, simply click on the name of the campaign you’d like to dive deeper on: ContiDarksideNefilimDoppelPaymerRyuk and Sunburst.

Section 1 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

WHY is Trend Micro offering this?

As a valued customer, we want to ensure you are aware of the risks that such high-profile campaigns can pose to your organization.

Given the current environment, we believe now more than ever is an opportune time to leverage this service—and optionally, the complementary XDR capabilities—as part of your endpoint deployment to improve security effectiveness.

HOW can I enable it?

Simply follow the instructions provided via the in-product notification, which will ask you to provide basic system information to proceed with the scan. 

Section 2 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.