TRNM0003 – Apex One™ Training For Certified Professionals

  • Duration: 10 weeks
Categories:

1. Apex One Overview

  • Trend Micro solutions
  • Key features of Apex One
  • Apex One components
  • Deployment methods
  • Threat detection

2. Apex One Server

  • Apex One Server tasks
  • Apex One Server services and components
  • Configuration repositories
  • Installing/upgrading Apex One Server
  • Apex One plug-ins and utilities

3. Apex One Web Management Console

  • Logging into the console
  • Integrating with Active Directory
  • Creating new administrative accounts

4. Security Agents

  • Security Agent tasks
  • Security Agent services and components
  • Security Agent tree
  • Installing Agents
  • Migrating from other endpoint security software
  • Agent-to-Server/Server-to-Agent communication
  • Endpoint location
  • Moving Security Agents
  • Uninstalling Security Agents
  • Agent settings and grouping
  • Agent self-protection
  • Agent privileges

5. Managing Off-Premise Agents

  • Protection features
  • Installing the Apex One Edge Relay Server
  • Registering the Apex One Edge Relay Server
  • Edge Relay Server and external Agent
  • communication
  • Edge Relay Server digital certificates

6. Keeping Apex One Updated

  • ActiveUpdate
  • Updating the Apex One Server
  • Updating Security Agents
  • Update Agents
  • Security compliance

7. Trend Micro Smart Protection

  • Smart Protection services and sources
  • Configuring the Smart Protection source

8. Protecting Endpoint Computers from Malware

  • Scanning for malware
  • Scan settings
  • Quarantining malware
  • Smart Scan
  • Spyware/grayware protection
  • Preventing outbreaks

9. Protecting Endpoint Computers Through Behavior Monitoring

  • Malware behavior blocking
  • Ransomware protection
  • Anti-exploit protection
  • Fileless malware protection
  • Newly encountered program detection
  • Event monitoring
  • Behavior monitoring exceptions

10. Protecting Endpoint Computers from Unknown Threats

  • Common Vulnerabilities and Exposures exploits
  • Predictive machine learning
  • Offline predictive machine learning

11. Detecting Emerging Malware Through Trend Micro™ Connected Threat Defense

  • Connected Threat Defense requirements
  • Deep Discovery Analyzer
  • Suspicious Objects

12. Blocking Web Threats

  • Web reputation
  • Detecting suspicious connections
  • Protecting against browser exploits

13. Protecting Endpoint Computers Through Traffic Filtering

  • Firewall filtering
  • Application filtering
  • Certified Safe Software list
  • Stateful inspection
  • Intrusion Detection System
  • Firewall policies and profiles

14. Preventing Data Leaks on Endpoint Computers

  • Data Loss protection
  • Installing Data Loss protection
  • Configuring data identifiers, data loss prevention templates and policies
  • Device control

15. Deploying Policies Through Apex Central

  • Apex Central
  • Apex Central management modes
  • Managing Apex One policies in Apex Central
  • Data Discovery policies

16. Blocking Unapproved Applications on Endpoint Computers

  • Integrated Application Control
  • Application Control criteria
  • Implementing Application Control
  • User-based Application Control
  • Lockdown Mode
  • Best practices

17. Protecting Endpoint Computers from Vulnerabilities

  • Integrated Vulnerability Protection
  • Vulnerability Protection Pattern
  • Implementing Vulnerability Protection
  • Network Engine settings

18. Detecting and Investigating Security Incidents on Endpoint Computers

  • Integrated Endpoint Sensor
  • Endpoint Detection and Response
  • Apex One Incident Response Model
  • Managed Detection and Response

19. Troubleshooting Apex One

  • Debugging the Apex One Server and Agents
  • Troubleshooting communication issues
  • Troubleshooting virus infection
  • Troubleshooting Apex One services
  • Troubleshooting sample submission

Leave feedback about this