If you have not yet enabled the Smart Feedback, Predictive Machine Learning or Behavior Monitoring in your product, you can activate these features and run the scan again. Data shared through these features allows Trend Micro to identify and address new threats such as Sunburst.
Please read through the steps first, since multiple configuration settings can be done at one configuration menu per product.
Customers are also encouraged to ensure that the Trend Micro products are patched and updated to the latest versions:
- For Apex One, please refer to Checklist for migrating Apex One Agent to Trend Micro Vision One.
- For all other products, please visit the Download Center and apply the latest updates on the Trend Micro product.
For more information about the features of Targeted Attack Detection, please refer to Targeted Attack Detection feature on Vision One.
Enable Smart Feedback
To enable Smart Feedback for Standard Endpoint Protection (for Windows):
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Administration > Smart Protection.
- Click the Enable Trend Micro Smart Feedback.
- Select the Industry type to help Trend Micro understand your organization.
- Tick the Enable feedback of suspicious program files check box to send information about potential security threats in the files on your Standard Endpoint Protection Agents.
- Set the number of detections for the specific amount of time that triggers the feedback to configure the criteria for sending feedback.
- Specify the maximum bandwidth Standard Endpoint Protection can use when sending feedback to minimize network interruptions.
- Click Save.
To enable Smart Feedback for Standard Endpoint Protection (for Mac):
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Administration > Smart Feedback.
- Click the Enable Trend Micro Smart Feedback.
- Click Save.
To enable Smart Feedback for Server & Workload Protection:
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target workload instance on Server & Workload Protection Manager.
- Go to Administration > Smart Protection.
- Click the Enable Trend Micro Smart Feedback.
- Select the Industry type to help Trend Micro understand your organization.
- Tick the Send suspicious file signatures along with feedback option.
- Set the number of detections for the specific amount of time that triggers the feedback to configure the criteria for sending feedback.
- Specify the maximum bandwidth Server & Workload Protection can use when sending feedback to minimize network interruptions.
- Click Save.
Reference: Protection in Workload Security
To enable Smart Feedback for Apex One as a Service (for Windows):
- Use single sign-on to Apex One server. Go to Directories > Product Servers and click Apex One as a Service URL.
- Go to Administration > Smart Protection.
- Click the Enable Trend Micro Smart Feedback.
- Select the Industry type to help Trend Micro understand your organization.
- Tick the Enable feedback of suspicious program files check box to send information about potential security threats in the files on your Security Agents.
- Set the number of detections for the specific amount of time that triggers the feedback to configure the criteria for sending feedback.
- Specify the maximum bandwidth Apex One can use when sending feedback to minimize network interruptions.
- Click Save.
To enable Smart Feedback for Apex One as a Service (for Mac):
- Use single sign-on to Apex One server. Go to Directories > Product Servers and click Apex One (Mac) as a Service URL.
- Go to Administration > Smart Feedback.
- Click Enable Trend Micro Smart Feedback.
- Click Save.
To enable Smart Feedback for On-Premise Apex One:
- On the console, navigate to Administration > Smart Protection.
- Click Enable Trend Micro Smart Feedback.
- Select the Industry type to help Trend Micro understand your organization.
- Tick the Enable feedback of suspicious program files check box to send information about potential security threats in the files on your Security Agents.
- Set the number of detections for the specific amount of time that triggers the feedback to configure the criteria for sending feedback.
- Specify the maximum bandwidth Apex One can use when sending feedback to minimize network interruptions.
- Click Save.
To enable Smart Feedback for Cloud One Workload Security or Deep Security:
- Log in to Trend Micro Cloud One > Workload Security.
- Go to Administration > Smart Feedback.
- Click Enable Trend Micro Smart Feedback.
- Select the "Industry" type to help Trend Micro understand your organization.
- Tick the "Send suspicious file signatures along with feedback" option.
- Set the number of detections for the specific amount of time that triggers the feedback to configure the criteria for sending feedback.
- Specify the maximum bandwidth Cloud One Workload Security can use when sending feedback to minimize network interruptions.
- Click Save.
Reference: Protection in Workload Security
To enable Smart Feedback for Cloud App Security (CAS):
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose the Default Exchange Policy ATP > Advanced Spam Protection.
- Tick "Allow Trend Micro to collect suspicious email information to improve its detection capabilities".
- Choose Default Exchange Policy ATP > Malware Scanning.
- Tick "Allow Trend Micro to collect suspicious file information to improve its detection capabilities".
- Click Save.
- Review other policies and ensure that the same option has been enabled.
To enable Smart Feedback for Deep Discovery Inspector (DDI):
- Log in to Deep Discovery Inspector > Administration > Threat Detections.
- Ensure that "Enable All Threat Detections" is enabled, and that "Enable threat detections" is ticked.
- Click Save.
Enable Predictive Machine Learning
To enable PML for Standard Endpoint Protection:
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Policies > Policy Management.
- For the Standard Endpoint Protection Agent, create a new policy or click an existing policy to modify its settings.
- In the Advanced Threat Protection section, click Predictive Machine Learning.
- Select "Enable Predictive Machine Learning".
- Under Detection Settings, select the type of detections and related action that Predictive Machine Learning takes.
- Repeat steps 1 to 6, but this time create a policy for Standard Endpoint Protection Agent (Mac).
Recommended Action:
Under Detection Settings, use the following actions:
Click the image to enlarge.
To enable PML for Server & Workload Protection (Recommended Action):
- Log in to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance..
- Go to the Policy tab.
- On the left column, navigate to Common Objects > Other > Malware Scan Configuration.
- Double-click the configuration with Scan Type "Real-Time" to open the Properties window.
- Under the General Tab, look for the section Predictive Machine Learning.
- Tick the option "Enable Predictive Machine Learning" and underneath it, set the "Action to take:" box to "Quarantine (Recommended)".
Click the image to enlarge.
- Click Apply/Ok to apply the change.
Reference: Detect emerging threats using Predictive Machine Learning
To enable PML for Apex One as a Service:
- Go to Policies > Policy Management.
- For the Apex One Security Agent, create a new policy or click an existing policy to modify its settings.
- In the Advanced Threat Protection section, click Predictive Machine Learning.
- Select "Enable Predictive Machine Learning".
- Under Detection Settings, select the type of detections and related action that Predictive Machine Learning takes.
- Repeat steps 1 to 5, but this time create a policy for Apex One (Mac).
Recommended Action:
Under Detection Settings, use the following actions:
To enable PML for On-Premise Apex One:
- Go to Agents > Agent Management.
- In the agent tree, click the root domain icon to include all agents or select specific domains or agents.
- Click Settings > Predictive Machine Learning Settings. The Predictive Machine Learning Settings screen should appear.
- Select "Enable Predictive Machine Learning".
- Under Detection Settings, select the type of detections and related action that Predictive Machine Learning takes.
Recommended Action:
Under Detection Settings, use the following actions:
To enable PML for Cloud One Workload Security or Deep Security (Recommended Action):
- Log in to the Deep Security Manager or Cloud One Workload Security console.
- Go to the Policy tab.
- On the left column, navigate to Common Objects > Other > Malware Scan Configuration.
- Double-click the configuration with Scan Type "Real-Time" to open the Properties window.
- Under the General Tab, look for the section Predictive Machine Learning.
- Tick the option "Enable Predictive Machine Learning" and underneath it, set the "Action to take:" box to "Quarantine (Recommended)".
- Click Apply/Ok to apply the change.
Reference: Detect emerging threats using Predictive Machine Learning
To enable PML for Cloud App Security (CAS):
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose Default Exchange Policy ATP > Malware Scanning.
- Tick "Enable Predictive Machine Learning".
- Click Save.
- Review other policies and ensure that the same option has been enabled.
To enable PML for Deep Discovery Inspector (DDI):
- Log in to Deep Discovery Inspector > Administration > Threat Detections.
- Under Smart Feedback, ensure that both "Enable Smart Feedback" and "Submit suspicious files to Trend Micro" are ticked.
- Click Save.
Enable Behavior Monitoring
To enable Behavior Monitoring for Standard Endpoint Protection:
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Policies > Policy Management.
- Create a new policy or click an existing policy to modify its setting.
- In the Advanced Threat Protection section, click Behavior Monitoring.
- Select "Enable Malware Behavior Monitoring".
- Under Threats to block, select "Known and potential threats".
Recommended Setting:
Enable Ransomware and Anti-exploit Protection:
Click the image to enlarge.
To enable Behavior Monitoring for Server & Workload Protection (Recommended Action):
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Server & Workload Protection > select your target workload instance on Server & Workload Protection Manager.
- Go to the Policy tab.
- On the left column, navigate to Common Objects > Other > Malware Scan Configurations.
- Double-click the configuration with Scan Type "Real-Time" to open the Properties window.
- Under the General Tab, look for the section Behavior Monitoring.
This feature is only available on agent-based protection.
- Check the option "Enable Behavior Monitoring" and then underneath it, set the "Action to take:" box to "ActiveAction (Recommended)". Additionally, tick the option "Back up and restore ransomware-encrypted files".
Click the image to enlarge.
- Click Apply/Ok to apply the change.
Reference: Enhanced Anti-Malware and Ransomware Scanning with Behavior Monitoring
To enable Behavior Monitoring for Apex One as a Service:
- Go to Policies > Policy Management.
- Create a new policy or click an existing policy to modify its setting.
- In the Advanced Threat Protection section, click Behavior Monitoring.
- Select "Enable Malware Behavior Monitoring".
- Under Threats to block, select "Known and potential threats".
Recommended Setting:
Enable Ransomware and Anti-exploit Protection:
To enable Behavior Monitoring for On-Premise Apex One:
- Go to Agents > Agent Management.
- In the agent tree, click the root domain icon to include all agents or select specific domains or agents.
- Click Settings > Behavior Monitoring Settings. The Behavior Monitoring Settings screen appears.
- Select Enable Malware Behavior Blocking.
- Under Threats to block, select "Known and potential threats".
Recommended Setting:
Enable Ransomware and Anti-exploit Protection:
To enable Behavior Monitoring for Cloud One Workload Security or Deep Security (Recommended Action):
- Log in to the Deep Security Manager or Cloud One Workload Security console.
- Go to the Policy tab.
- On the left column, navigate to Common Objects > Other > Malware Scan Configurations.
- Double-click the configuration with Scan Type "Real-Time" to open the Properties window.
- Under the General Tab, look for the section Behavior Monitoring.
This feature is only available on agent-based protection.
- Check the option "Enable Behavior Monitoring" and then underneath it, set the "Action to take:" box to "ActiveAction (Recommended)". Additionally, tick the option "Back up and restore ransomware-encrypted files".
- Click Apply/Ok to apply the change.
Reference: Enhanced Anti-Malware and Ransomware Scanning with Behavior Monitoring
Enable Virus Scan API
To enable VSAPI for Standard Endpoint Protection:
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Policies > Policy Management.
- For Apex One Security Agent, create a new policy or click an existing policy to modify its settings.
- In the Anti-Malware Scans section, click Real-time Scan.
- Select "Enable virus/malware scan".
- Repeat the steps, but this time create a policy for Apex One (Mac).
Recommended Actions:
- Click the Action tab.
- Select "Use a specific action for each virus/malware type".
- Use the following action:
Click the image to enlarge.
To enable VSAPI for Server & Workload Protection:
- Log in to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Server & Workload Protection > select your target workload instance on Server & Workload Protection Manager.
- Go to the Policy tab.
- On the left column, navigate to Policies.
- Double-click the target policy to open the Properties window.
- Select Anti-Malware on the left column.
- On the General tab, make sure that the Anti-Malware State is set to "On". Additionally, make sure that there are Malware Scan Configurations set on the three Scan Types.
Click the image to enlarge.
Recommended Actions
To configure the scan settings, go to Policies > Common Objects > Other > Malware Scan Configuration and then double-click the target configuration to open the Properties window. From there, configure the scan settings based on the recommendations below (as per the Best Practice Guide):
Click the image to enlarge.
Click the image to enlarge.
Click the image to enlarge.
Reference: Deep Security 20 BPG
To enable VSAPI for Apex One as a Service:
- Go to Policies > Policy Management.
- For Apex One Security Agent, create a new policy or click an existing policy to modify its settings.
- In the Anti-Malware Scans section, click Real-time Scan.
- Select "Enable virus/malware scan".
- Repeat the steps, but this time create a policy for Apex One (Mac).
Recommended Actions:
To enable VSAPI for On-Premise Apex One:
- Go to Agents > Agent Management.
- In the agent tree, click the root domain icon to include all agents or select specific domains or agents.
- Click Settings > Scan Settings > Real-time Scan Settings. The Real-time Scan Settings screen should appear.
- Select "Enable virus/malware scan".
Recommended Actions:
To enable VSAPI for Cloud One Workload Security or Deep Security:
- Log in to the Deep Security Manager or Cloud One Workload Security console.
- Go to the Policy tab.
- On the left column, navigate to Policies.
- Double-click the target policy to open the Properties window.
- Select Anti-Malware on the left column.
- On the General tab, make sure that the Anti-Malware State is set to "On". Additionally, make sure that there are Malware Scan Configurations set on the three Scan Types.
Recommended Actions
To configure the scan settings, go to Policies > Common Objects > Other > Malware Scan Configuration and then double-click the target configuration to open the Properties window. From there, configure the scan settings based on the recommendations below (as per the Best Practice Guide):
Reference: Deep Security 20 BPG
To enable VSAPI for Cloud App Security (CAS):
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose Default Exchange Policy ATP > General, and then make sure that Enable Real-time Scanning is "ON". By default, this is enabled.
- Review other policies and ensure that the same option has been enabled.
Recommended Actions:
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose Default Exchange Policy ATP > General, and then make sure that Enable Real-time Scanning is "ON". By default, this is enabled.
- In the Available Targets section, make sure to select "groups" instead of "users" for better protection.
To enable VSAPI for Deep Discovery Inspector (DDI):
You may enable or disable the following features:
- Threat Detections - detect both known and potential threats. Deep Discovery Inspector enables this feature by default.
- Outbreak Containment Service - enables Deep Discovery Inspector to record detection information in the logs and block network traffic.
- Go to Administration > Monitoring/Scanning > Threat Detections.
- Select "Enable All Threat Detections".
- Under Threat Detection, select "Enable threat detections".
- (Optional) Select "Enable Mobile App Reputation Service (MARS) server query".
- Under Outbreak Containment Service, select one of the following:
- Enable outbreak detection - does not block traffic
- Enable outbreak detection and block traffic - blocks traffic
Outbreak Containment Service is a Trend Micro utility that detects both known and unknown malware that can potentially start an outbreak. - Click Enable Smart Feedback (recommended) to send threat information to the Trend Micro Smart Protection Network.
- Click Save.
Enable Web Reputation Services
To enable WRS for Standard Endpoint Protection:
- Login to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Standard Endpoint Protection > select your target endpoint instance.
- Go to Policies > Policy Management.
- For the Apex One Security Agent, create a new policy or click an existing policy to modify its settings.
- In the Advanced Threat Protection section, click Web Reputation.
- Select wihch operating systems for which you want to enable Web Reputation:
- Windows Desktop platforms
- Windows Server platforms
- Repeat the steps, but this time create a policy for Apex One (Mac).
Recommended Actions:
- Under Security Level, select "Medium" for the policy:
Click the image to enlarge.
- For the Approved/Blocked URL List, it is also highly recommended to add “internal domains to the approved URL List”.
To enable WRS for Server & Workload Protection (Recommended Action):
- Log in to Trend Vision One console > ENDPOINT SECURITY OPERATIONS > Server & Workload Protection > select your target workload instance on Server & Workload Protection Manager.
- Go to the Policy tab.
- On the left column, navigate to Policies.
- Double-click the target policy to open the Properties window.
- Select "Web Reputation" on the left column.
- On the General tab, enable "Web Reputation State" and then set the Security Level to "Medium".
Click the image to enlarge.
- Click Save and then Close to apply the new setting.
To enable WRS for Apex One as a Service:
- Go to Policies > Policy Management.
- For the Apex One Security Agent, create a new policy or click an existing policy to modify its settings.
- In the Advanced Threat Protection section, click Web Reputation.
- Select wihch operating systems for which you want to enable Web Reputation:
- Windows Desktop platforms
- Windows Server platforms
- Repeat the steps, but this time create a policy for Apex One (Mac).
Recommended Actions:
To enable WRS for On-Premise Apex One:
- Go to Agents > Agent Management.
- In the agent tree, click the root domain icon to include all agents or select specific domains or agents.
- Click Settings > Web Reputation. The Web Reputation Setting screen should appear.
- Select which operating systems for which you want to enable Web Reputation:
- Windows Desktop platforms
- Windows Server platforms
Recommended Actions:
To enable WRS for Cloud One Workload Security or Deep Security (Recommended Action):
- Log in to the Deep Security Manager or Cloud One Workload Security console.
- Go to the Policy tab.
- On the left column, navigate to Policies.
- Double-click the target policy to open the Properties window.
- Select "Web Reputation" on the left column.
- On the General tab, enable "Web Reputation State" and then set the Security Level to "Medium".
- Click Save and then Close to apply the new setting.
To enable WRS for Cloud App Security (CAS):
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose Default Exchange Policy ATP > Web Reputation, and then tick "Enable Web Reputation".
- Under Security Level, select High, Medium or Low settings as needed.
- Make sure that the following options are checked as well:
- Scan message attachment content for suspicious URLs
- Analyze URLs in real-time to detect phishing websites
- Rescan historical URLs when patterns update and take remedial actions
- Click Save.
- Review other policies and ensure that the same option has been enabled.
Recommended Actions
- Log in to Trend Micro Cloud App Security > Advanced Threat Protection.
- Choose Default Exchange Policy ATP > Web Reputation, and then tick "Enable Web Reputation".
- Under Security Level, select "Medium".
- Make sure that the following options are checked as well:
- Scan message attachment content for suspicious URLs
- Analyze URLs in real-time to detect phishing websites
- Rescan historical URLs when patterns update and take remedial actions
- Under Action, make sure that the settings are as follows:
- Action: Quarantine and Notify
- Blocked URL List: Quarantine and Notify
- For the Approved/Blocked URL List, it is highly recommended to add “internal domains to the approved URL List”.
To enable WRS for Deep Discovery Inspector (DDI):
- Go to Administration > Monitoring/Scanning > Web Reputation.
- Select "Enable Web Reputation".
- Select a Smart Protection source. Choose between:
- Trend Micro Smart Protection Network
- Smart Protection Server
For more information about Smart Protection sources, please refer to the DDI 6.0 Administrator's Guide. - (Optional) Enable Retro Scan.
- Select Smart Protection Server by configuring the Smart Protection Server List:
- Type the Smart Protection server name or IP address.
Obtain the IP address by going to Smart Protection > Reputation Services > Web Reputation on the Smart Protection Server console. The IP address forms part of the URL listed on the screen.
- (Optional) Click Test Connection.
- Type a description for the server.
- Update Smart Protection Server regularly.
- (Optional) If proxy settings for Deep Discovery Inspector have been configured for use with Smart Protection Server connections, select "Connect through a proxy server".
- Click Add.
- (Optional) Add more servers.
- Use the arrows under the Order column to set server priority.
- Type the Smart Protection server name or IP address.
- To filter excessive Web Reputation detections, tick "Exclude Spam and Adware detections to reduce detection volume".
- Click Save.
Additional Information
After configuring the required services for Targeted Attack, periodic analysis of your Smart Protection Network data would be performed, with continuous analysis of attack campaigns. The attack scope should reflect the actual endpoints, similar to the following image:
However, if only GUIDs appear, and not the actual endpoint hostname, as shown in the following image:
You may refer to the KB article: Checklist for migrating Apex One Agent to Trend Micro Vision One, and ensure that the necessary products are patched and updated.