Network VirusWall, ScanMail, ServerProtect, and TrendLabs ...

 Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at:



Trend Micro, the Trend Micro t-ball logo, Trend Micro Apex Central, Trend Micro Apex One, OfficeScan, Control Manager, Damage Cleanup Services, eManager, InterScan, Network VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

Copyright ? 2019. Trend Micro Incorporated. All rights reserved.

Document Part No.: APEMS8589/190219

Release Date: March 2019

Protected by U.S. Patent No.: 5,951,698

This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product.

Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base.

Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@.

Evaluate this documentation on the following site:



Privacy and Personal Data Collection Disclosure

Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features.

The following link outlines the types of data that Trend Micro Apex One collects and provides detailed instructions on how to disable the specific features that feedback the information.



Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Notice:



To understand data privacy and protection and how data is treated within Trend Micro SaaS offerings, see:



Table of Contents

Preface

Preface ................................................................................ xi Apex One Documentation .................................................... xii Audience ........................................................................... xiii Document Conventions ...................................................... xiii Terminology ....................................................................... xiv

Part I: Introduction and Getting Started

Chapter 1: Introducing Apex One

About Apex One ................................................................. 1-2 What's New ........................................................................ 1-2 Key Features and Benefits ................................................... 1-3 The Apex One Server .......................................................... 1-6 The Security Agent ............................................................. 1-8 Integration with Trend Micro Products and Services ............. 1-8

Chapter 2: Getting Started with Apex One

The Web Console ................................................................ 2-2 The Dashboard ................................................................... 2-5 Active Directory Integration .............................................. 2-32 The Apex One Agent Tree .................................................. 2-35 Apex One Domains ........................................................... 2-49

i

Trend Micro Apex OneTM Administrator's Guide

Chapter 3: Getting Started with Data Protection

Data Protection Installation ................................................. 3-2 Data Protection License ...................................................... 3-4 Deployment of Data Protection to Security Agents ................ 3-6 Forensic Folder and DLP Database ....................................... 3-8 Uninstalling Data Protection .............................................. 3-14

Part II: Protecting Security Agents

Chapter 4: Using Trend Micro Smart Protection

About Trend Micro Smart Protection ................................... 4-2 Smart Protection Services ................................................... 4-3 Smart Protection Sources .................................................... 4-5 Smart Protection Pattern Files ............................................. 4-8 Setting Up Smart Protection Services .................................. 4-13 Using Smart Protection Services ........................................ 4-31

Chapter 5: Installing the Security Agent

Security Agent Fresh Installations ........................................ 5-2 Installation Considerations ................................................. 5-2 Deployment Considerations ................................................ 5-9 Migrating to the Security Agent .......................................... 5-54 Post-installation ................................................................ 5-59 Security Agent Uninstallation ............................................ 5-61

Chapter 6: Keeping Protection Up-to-Date

Apex One Components and Programs .................................. 6-2 Update Overview ............................................................... 6-11

ii

Table of Contents

Apex One Server Updates .................................................. 6-14 Integrated Smart Protection Server Updates ....................... 6-26 Security Agent Updates ..................................................... 6-27 Update Agents .................................................................. 6-53 Component Update Summary ............................................ 6-62

Chapter 7: Scanning for Security Risks

About Security Risks ........................................................... 7-2 Scan Method Types ............................................................. 7-8 Scan Types ....................................................................... 7-14 Settings Common to All Scan Types .................................... 7-26 Scan Privileges and Other Settings ..................................... 7-55 Global Scan Settings .......................................................... 7-67 Security Risk Notifications ................................................. 7-78 Security Risk Logs ............................................................. 7-88 Security Risk Outbreaks ................................................... 7-102

Chapter 8: Protecting Against Unknown Threats

Predictive Machine Learning ............................................... 8-2 Suspicious Connection Service ............................................ 8-5 Sample Submission ............................................................. 8-9 Unknown Threat Logs ....................................................... 8-10

Chapter 9: Using Behavior Monitoring

Behavior Monitoring ........................................................... 9-2 Configuring Global Behavior Monitoring Settings ............... 9-18 Behavior Monitoring Privileges .......................................... 9-20 Behavior Monitoring Notifications for Security Agent Users . 9-21

iii

Trend Micro Apex OneTM Administrator's Guide

Behavior Monitoring Logs ................................................. 9-22

Chapter 10: Using Device Control

Device Control .................................................................. 10-2 Permissions for Storage Devices ........................................ 10-4 Permissions for Non-storage Devices ................................ 10-11 Managing Access to External Devices (Data Protection Activated) ....................................................................... 10-11 Managing Access to External Devices (Data Protection Not Activated) ....................................................................... 10-15 Modifying Device Control Notifications ............................ 10-18 Device Control Logs ........................................................ 10-18

Chapter 11: Using Data Loss Prevention

Data Loss Prevention (DLP) ............................................... 11-2 Data Loss Prevention Policies ............................................ 11-3 Data Identifier Types ......................................................... 11-5 Data Loss Prevention Templates ....................................... 11-19 DLP Channels ................................................................. 11-24 Data Loss Prevention Actions ........................................... 11-38 Data Loss Prevention Exceptions ...................................... 11-41 Data Loss Prevention Policy Configuration ........................ 11-47 Data Loss Prevention Notifications ................................... 11-52 Data Loss Prevention Logs ............................................... 11-56

Chapter 12: Using Web Reputation

About Web Threats ............................................................ 12-2 Command & Control Contact Alert Services ........................ 12-2 Web Reputation ................................................................ 12-4

iv

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download