Visão Geral
Este curso Trend Micro Apex One for Certified Professionals, apresenta uma formação completa sobre implantação, administração e operação da plataforma Trend Micro Apex One, uma solução avançada de proteção de endpoints utilizada por organizações para defender estações de trabalho e servidores contra malware, ransomware, exploits e ameaças avançadas.
O Trend Micro Apex One for Certified Professionals, aborda a arquitetura da plataforma, instalação do servidor Apex One, implantação de agentes, gerenciamento de políticas de segurança e utilização de tecnologias avançadas de proteção, incluindo Behavior Monitoring, Exploit Prevention, Application Control, Device Control e Web Reputation Services.
Durante o curso, os participantes aprenderão como planejar, implementar e administrar ambientes corporativos protegidos com Apex One, além de monitorar eventos de segurança, responder a incidentes e aplicar boas práticas para proteção de endpoints em ambientes corporativos modernos.
Conteúdo Programatico
Trend Micro Apex One Overview
- Key features of Trend Micro Apex One
- Trend Micro Apex One components
- Deployment methods
- Threat detection
Trend Micro Apex One Server
- Trend Micro Apex One server tasks
- Trend Micro Apex One database
- Installing the Trend Micro Apex One server
- Upgrading existing installation
- Trend Micro Apex One plug-ins and utilities
Trend Micro Apex One Web Console
- Logging into the console
- Integrating with Microsoft Active Directory
- Creating new administrative roles and accounts
Managing Security Agents
- Security agent tasks
- Security agent services and components
- Security agent requirements
- Installing/uninstalling agents
- Migrating from other endpoint security software
- Agent-to-server communication
- Endpoint location
- Agent self-protection
- Security agent settings
- Grouping security agents
Managing Off-Premises Agents
- Trend Micro Apex One Edge Relay Server
Keeping Trend Micro Apex One Up to Date
- Pattern updates
- Updating managed products
- Updating security agents
- Security compliance
Trend Micro™ Global Threat Intelligence
- Global threat intelligence services
- Configuring global threat intelligence sources
Protecting Endpoint Computers from Malware
- Scanning for malware
- Scan settings
- Quarantining malware
- Trend Micro™ SmartScan™
- Spyware/Grayware protection
- Preventing outbreaks
Protecting Endpoint Computers Through Behavior Monitoring
- Malware behavior blocking
- Ransomware protection
- Anti-exploit protection
- Fileless malware protection
- Newly encountered program detection
- Event monitoring
- Behavior monitoring exceptions
Protecting Endpoint Computers from Unknown Threats
- Common vulnerabilities and exposures exploits (CVE)
- Predictive machine learning
- Offline predictive machine learning
Blocking Web Threats
- Web reputation
- Detecting suspicious connections
- Protecting against browser exploits
Protecting Endpoint Computers Through Traffic Filtering
- Firewall filtering
- Application filtering
- Certified Safe Software list
- Stateful inspection
- Intrusion detection system
- Firewall policies and profiles
Preventing Data Loss on Endpoint Computers
- Digital asset control
- Configuring data identifiers, data loss prevention (DLP) templates, and policies
- Data discovery
- Device control
Deploying Policies Through Trend Micro Apex Central™
- Trend Micro Apex Central services
- Connecting Trend Micro Apex One to Trend Micro Apex Central
- Managing policies
- Policy inheritance
- Data discovery policies
Blocking Unapproved Applications on Endpoint Computers
- Integrating application control
- Lockdown mode
- Application control criteria
- Implementing application control
- User-based application control
- Application control best practices
Protecting Endpoint Computers from Vulnerabilities
- Integrating vulnerability protection
- Vulnerability protection pattern
- Selecting a priority mode
- Network engine settings
Integrating with Trend Vision One
- Trend Vision One capabilities
- Collecting telemetry
- Connecting Trend Micro Apex Central to Trend Vision One
- Endpoint inventory
- Endpoint basecamp
Introduction to XDR Threat Investigation
- Detection models
- Observed attack techniques
- Workbenches
- Searches
Detecting Emerging Malware Through Threat Intelligence
- Threat intelligence phases
- Threat intelligence requirements
- Suspicious objects
- Enabling sample submission
- Viewing suspicious objects