Sie sind auf Seite 1von 6

TMAO - Trend Micro Apex One

Overview
Course Code TMAO Duration 3.0 days

In this course, you will learn how to use Trend Micro Apex One™. This course details basic
architecture, protection functionality, deployment scenarios, and troubleshooting. Through
hands-on labs, participants practice configuring Apex One protection features, along with
the administration options needed for a successful implementation and longterm
maintenance.

Audience
This course is designedfor IT professionals responsible for protecting endpoint computers from databreaches and
targeted attacks.

Pre-Requisites
There are no prerequisites to attend this course, however, a working knowledge of Trend
Micro products and services, as well as an understanding of basic networking concepts and
principles will be helpful. Basic knowledge of the following topics is also beneficial:

Windows® servers and clients


Microsoft® Internet Information Server (IIS)
General understanding of malware

Participants are required to bring a laptop computer with a recommended screen resolution
of at least 1980 x 1080 or above, and a display size of 15” or above.

Key Topics
Describe the purpose, features, functions, and capabilities of Apex One
Define the components that make up Apex One
Implement security using Security Agents
Configure and administer Apex One Servers and Agents
Deploy Apex One policies using Trend Micro Apex Central
Troubleshoot common issues
Objectives
After completing this course, participants will be able to:

Describe the purpose, features, functions, and capabilities of Apex One


Define the components that make up Apex One
Implement security using Security Agents
Configure and administer Apex One Servers and Agents
Deploy Apex One policies using Trend Micro Apex Central
Troubleshoot common issues
Attempt the Trend Micro Certified Professional for Apex One Certification Exam

Details
Course Outline
1. Apex One Overview
Trend Micro solutions

Key features of Apex One

Apex One components

Deployment methods

Threat detection
2. Apex One Server
Apex One Server tasks

Apex One Server servicesand components

Configurationrepositories

Installing/upgradingApex One Server

Apex One plug-ins andutilities


3. Apex One Web Management Console
Logging into the console

Integrating with ActiveDirectory

Creating newadministrative accounts


4. Security Agents
Security Agent tasks

Security Agent servicesand components

Security Agent tree

Installing Agents

Migrating from otherendpoint security software

Agent-to-Server/Server-to-Agentcommunication

Endpoint location

Moving Security Agents

Uninstalling SecurityAgents

Agent settings andgrouping

Agent self-protection

Agent privileges
5. Managing Off-Premise Agents
Protection features

Installing the Apex OneEdge Relay Server

Registering the Apex OneEdge Relay Server

Edge Relay Server andexternal Agent communication

Edge Relay Serverdigital certificates


6. Keeping Apex One Updated
Active Update

Updating the Apex OneServer

Updating Security Agents

Update Agents

Security compliance
7. Trend Micro Smart Protection
Smart Protectionservices and sources

Configuring the SmartProtection source


8. Protecting Endpoint Computers from Malware
Scanning for malware

Scan settings

Quarantining malware

Smart Scan

Spyware/graywareprotection

Preventing outbreaks
9. Protecting Endpoint Computers ThroughBehavior Monitoring
Malware behaviorblocking

Ransomware protection

Anti-exploit protection

Fileless malwareprotection

Newly encounteredprogram detection

Event monitoring

Behavior monitoringexceptions
10. Protecting Endpoint Computers from UnknownThreats
Common Vulnerabilitiesand Exposures exploits

Predictive machinelearning

Offline predictivemachine learning


11. Detecting Emerging Malware Through TrendMicro™ Connected Threat Defense
Connected Threat Defenserequirements

Deep Discovery Analyzer

Suspicious Objects
12. Blocking Web Threats
Web reputation

Detecting suspiciousconnections

Protecting againstbrowser exploits


13. Protecting Endpoint Computers Through TrafficFiltering
Firewall filtering

Application filtering

Certified Safe Softwarelist

Stateful inspection

Intrusion DetectionSystem

Firewall policies andprofiles


14. Preventing Data Leaks on Endpoint Computers
Data Loss protection

Installing Data Lossprotection

Configuring dataidentifiers, data loss prevention templates and policies

Device control
15. Deploying Policies Through Apex Central
Apex Central

Apex Central managementmodes

Managing Apex Onepolicies in Apex Central

Data Discovery policies


16. Blocking Unapproved Applications on EndpointComputers
Integrated ApplicationControl

Application Controlcriteria

Implementing ApplicationControl

User-based Application Control


Lockdown Mode

Best practices
17. Protecting Endpoint Computers fromVulnerabilities
Integrated VulnerabilityProtection

Vulnerability ProtectionPattern

ImplementingVulnerability Protection

Network Engine settings


18. Detecting and Investigating SecurityIncidents on Endpoint Computers
Integrated EndpointSensor

Endpoint Detection andResponse

Apex One IncidentResponse Model

Managed Detection andResponse


19. Troubleshooting Apex One
Debugging the Apex OneServer and Agents

Troubleshootingcommunication issues

Troubleshooting virusinfection

Troubleshooting Apex Oneservices

Troubleshooting samplesubmission

Das könnte Ihnen auch gefallen