Detailed Course Outline
Apex One Overview
- Trend Micro solutions
- Key features of Apex One
- Apex One components
- Deployment methods
- Threat detection
Apex One Server
- Apex One Server tasks
- Apex One Server services and components
- Configuration repositories
- Installing/upgrading Apex One Server
- Apex One plug-ins and utilities
Apex One Web Management Console
- Logging into the console
- Integrating with Active Directory
- Creating new administrative accounts
Security Agents
- Security Agent tasks
- Security Agent services and components
- Security Agent tree
- Installing Agents
- Migrating from other endpoint security software
- Agent-to-Server/Server-to-Agent communication
- Endpoint location
- Moving Security Agents
- Uninstalling Security Agents
- Agent settings and grouping
- Agent self-protection
- Agent privileges
Managing Off-Premise Agents
- Protection features
- Installing the Apex One Edge Relay Server
- Registering the Apex One Edge Relay Server
- Edge Relay Server and external Agent communication
- Edge Relay Server digital certificates
Keeping Apex One Updated
- ActiveUpdate
- Updating the Apex One Server
- Updating Security Agents
- Update Agents
- Security compliance
Trend Micro Smart Protection
- Smart Protection services and sources
- Configuring the Smart Protection source
Protecting Endpoint Computers from Malware
- Scanning for malware
- Scan settings
- Quarantining malware
- Smart Scan
- Spyware/grayware protection
- Preventing outbreaks
Protecting Endpoint Computers Through Behavior Monitoring
- Malware behavior blocking
- Ransomware protection
- Anti-exploit protection
- Fileless malware protection
- Newly encountered program detection
- Event monitoring
- Behavior monitoring exceptions
Protecting Endpoint Computers from Unknown Threats
- Common Vulnerabilities and Exposures exploits
- Predictive machine learning
- Offline predictive machine learning
Detecting Emerging Malware Through Trend Micro™ Connected Threat Defense
- Connected Threat Defense requirements
- Deep Discovery Analyzer
- Suspicious Objects
Blocking Web Threats
- Web reputation
- Detecting suspicious connections
- Protecting against browser exploits
Protecting Endpoint Computers Through Traffic Filtering
- Firewall filtering
- Application filtering
- Certified Safe Software list
- Stateful inspection
- Intrusion Detection System
- Firewall policies and profiles
Preventing Data Leaks on Endpoint Computers
- Data Loss protection
- Installing Data Loss protection
- Configuring data identifiers, data loss prevention templates and policies
- Device control
Deploying Policies Through Apex Central
- Apex Central
- Apex Central management modes
- Managing Apex One policies in Apex Central
- Data Discovery policies
Blocking Unapproved Applications on Endpoint Computers
- Integrated Application Control
- Application Control criteria
- Implementing Application Control
- User-based Application Control
- Lockdown Mode
- Best practices
Protecting Endpoint Computers from Vulnerabilities
- Integrated Vulnerability Protection
- Vulnerability Protection Pattern
- Implementing Vulnerability Protection
- Network Engine settings
Detecting and Investigating Security Incidents on Endpoint Computers
- Integrated Endpoint Sensor
- Endpoint Detection and Response
- Apex One Incident Response Model
- Managed Detection and Response
Troubleshooting Apex One
- Debugging the Apex One Server and Agents
- Troubleshooting communication issues
- Troubleshooting virus infection
- Troubleshooting Apex One services
- Troubleshooting sample submission