Trend Vision One Integration
Integration with Trend Vision One allows Apex Central to forward detection events and Security Agent information from managed Apex One servers to Trend Vision One for correlated detection and other advanced analytics.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | Apex One console Administration > Settings > Apex Central
Apex Central Console
|
Apex Central Console
Trend Vision One Integration | |
---|---|
Description | Integration with Trend Vision One allows Apex Central to forward detection events and Security Agent information from managed Apex One servers to Trend Vision One for correlated detection and other advanced analytics. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex One console Administration > Settings > Apex Central
Apex Central Console
|
Active Directory Synchronization | |
---|---|
Description | Active Directory synchronization maps the User/Endpoint Directory according to your existing organizational structure. |
Data Transmitted to Trend Micro | Active Directory site information
|
Feature Configuration Location | Apex Central console Administration > Settings > Active Directory and Compliance Settings
|
User Accounts | |
---|---|
Description | User account information includes personal data. |
Data Transmitted to Trend Micro | User account information
|
Feature Configuration Location | Apex Central console Administration > Account Management > User Accounts
|
Contact Groups | |
---|---|
Description | Contact Groups for event notifications can include manually added email addresses for additional recipients. |
Data Transmitted to Trend Micro | Email address |
Feature Configuration Location | Apex Central console Detections > Notifications > Contact Groups
|
Application Control Criteria | |
---|---|
Description | Application Control supports different types of Application Control Criteria for filtering. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Resources > Application Control Criteria > [new or existing policy resources]
|
DLP Data Identifiers | |
---|---|
Description | Keyword lists contain special words or phrases that define digital assets belonging to your organization. |
Data Transmitted to Trend Micro | Keywords |
Feature Configuration Location | Apex Central console Policies > Policy Resources > DLP Data Identifiers > Keyword Lists
|
Historical Investigation | |
---|---|
Description | Historical Investigations can quickly identify endpoints which are possible candidates for further analysis. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Response > Historical Investigation
|
Live Investigation: Scan disk files using OpenIOC | |
---|---|
Description | Live Investigations perform the investigation on the current system state. Live Investigations can be configured to run at specific periods, and also support a wider set of criteria through the use of OpenIOC and YARA rules. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console
|
Live Investigation: Search registry | |
---|---|
Description | Live Investigations perform the investigation on the current system state. Live Investigations can be configured to directly search registry keys, names, and data stored in the Windows Registry database to investigate registry changes. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console
|
Managed Detection and Response Service | |
---|---|
Description | The Managed Detection and Response Service sends threat investigation data to the Trend Micro Threat Investigation Center to investigate and help identify potential attacks on your environment. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Response > Managed Detection and Response > Settings
|
Syslog Forwarding Service | |
---|---|
Description | With the syslog forwarding service enabled, Apex Central will forward logs to the specified syslog server. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Administration > Settings > Syslog Settings
|
Apex One Security Agent Policy Settings
Application Control | |
---|---|
Description | Application Control prevents unwanted and unknown applications from executing on your endpoints. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings
|
Application Control: Active Directory accounts | |
---|---|
Description | You can specify the user or group names of Active Directory accounts that specific Application Control criteria apply to. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings > Assign Rule
|
Behavior Monitoring: Approved/Blocked Program lists | |
---|---|
Description | The Behavior Monitoring exception list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically takes the specified action according to the list type. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Behavior Monitoring Settings > Exceptions |
Data Loss Prevention | |
---|---|
Description | Data Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One DLP > [new or existing rule] > Action
|
Data Loss Prevention Exceptions | |
---|---|
Description | The Data Loss Prevention Exceptions list contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One DLP > Exceptions |
Data Discovery | |
---|---|
Description | Data Discovery searches endpoints for the presence of sensitive information. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One Data Discovery
|
Device Control | |
---|---|
Description | To add a rule for specific AD user to control (allow, block, restrict access) user's devices. |
Data Transmitted to Trend Micro | AD User account |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents Add Device Control Rule |
Device Control: Allowed Programs | |
---|---|
Description | The Device Control Allowed Programs list contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents > All users (default) > Allowed Programs |
Manual Scan Exclusion (Directories) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Manual Scan. |
Data Transmitted to Trend Micro | Directory path |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Endpoint Sensor | |
---|---|
Description | Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Historical Investigations to discover hidden threats throughout your network and locate all affected endpoints. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Endpoint Sensor Settings
|
Endpoint Sensor: Attack Discovery | |
---|---|
Description | Attack Discovery identifies threats using Indicators of Attack (IoA), and logs detections that match known indicators. Attack Discovery shares threat information with Smart Feedback and Threat Investigation Center. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Endpoint Sensor Settings > Advanced Settings
|
Manual Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Manual Scan. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Predictive Machine Learning Exception List | |
---|---|
Description | The Predictive Machine Learning Exception List contains file hashes that the Security Agent does not scan during Predictive Machine Learning scanning. |
Data Transmitted to Trend Micro | Notes |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Predictive Machine Learning Setting > Exceptions > Add file hash |
Real-time Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Real-time Scan Settings
|
Real-time Scan: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Real-time Scan. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Real-time Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Real-time Scan. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Scan Now: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings
|
Scan Now: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Scan Now. |
Data Transmitted to Trend Micro | Directory path |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (Directories) |
Scan Now: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Scan Now. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (File) |
Scheduled Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scheduled Scan Settings |
Scheduled Scan: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Scheduled Scan. |
Data Transmitted to Trend Micro | Directory path |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Scheduled Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Scheduled Scan. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Suspicious Connection Detection | |
---|---|
Description | Suspicious Connection manages the User-defined and Global IP C&C lists, and monitors the behavior of connections that endpoints make to potential C&C servers. |
Data Transmitted to Trend Micro | IP address |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Suspicious Connection Settings
|
Trusted Program List | |
---|---|
Description | Add programs to the Trusted Programs List to exclude processes from suspicious activity monitoring. The programs should have a valid digital signature. |
Data Transmitted to Trend Micro | Program full path |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Trusted Program List |
Web Reputation Service: Approved/Blocked URL List | |
---|---|
Description | The Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation. Web Reputation automatically takes the specified action according to the list type. |
Data Transmitted to Trend Micro | URL |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Web Reputation Settings > External Agents/Internal Agents > Approved/Blocked URL List |
Vulnerability Protection | |
---|---|
Description | Vulnerability Protection automates the application of virtual patches before official patches become available. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Vulnerability Protection Settings
|
Apex One (Mac) Policy Settings
Device Control | |
---|---|
Description | Enable Device Control and set permission to Read Only or Block. When the Apex One (Mac) Security Agent detects and blocks a device, the system generates a log entry. |
Data Transmitted to Trend Micro | Device Name |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Device Control Settings |
Endpoint Sensor Settings | |
---|---|
Description | Endpoint Sensor is a powerful monitoring and investigation tool that identifies the presence, location, and entry point of threats based on endpoint information (such as computer name, IP address, domain file, and processes). |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Endpoint Sensor Settings
|
Manual Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Manual Scan Settings |
Predictive Machine Learning | |
---|---|
Description | Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Predictive Machine Learning Settings
|
Real-time Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks based on the file operation performed. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Real-time Scan Settings
|
Scan Exclusion Settings | |
---|---|
Description | The Scan Exclusion Lists contain directories and file extensions that Apex One (Mac) Security Agent does not scan. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Scan Exclusion Settings
|
Scheduled Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Scheduled Scan Settings
|
Trusted Program List | |
---|---|
Description | Add programs to the Trusted Programs List to exclude processes from suspicious activity monitoring. |
Data Transmitted to Trend Micro | Program full path |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Trusted Program List |
Web Reputation Service | |
---|---|
Description |
Web reputation technology tracks the credibility of web domains accessed by endpoints. Apex One (Mac) Security Agent sends queries to the Trend Micro Global Smart Scan Server for the following:
When the Send queries to Smart Protection Servers option is not selected. |
Data Transmitted to Trend Micro | URL |
Feature Configuration Location | Apex Central console Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Web Reputation Settings
|
Apex One Console
Configuring Global User-defined IP List Settings | |
---|---|
Description | Administrators can configure Apex One to allow, block, or log all connections between agents and user-defined C&C IP addresses. |
Data Transmitted to Trend Micro | IP Address |
Feature Configuration Location | SSO to Apex One server Agents > Global Agent Settings > Security Settings > Suspicious Connection Settings > Edit User-defined IP List |
Firewall: Policy Exception | |
---|---|
Description | Security Agents can perform specific actions on network traffic (block or allow) that meets the exception criteria for the traffic direction (inbound or outbound). |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Agents > Firewall > Policies > Add/Edit Policy > Add Exception
|
Firewall: Profile | |
---|---|
Description | Firewall profiles provide flexibility by allowing you to choose the attributes that a single agent or group of agents must have before applying a policy. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Agents > Firewall > Profiles
|
Apex One User Accounts | |
---|---|
Description | If you have an on-premises Apex Central server that you want to manage Trend Micro Security for Mac and the Apex One Console, you must create a user account to facilitate the communication between Trend Micro Security for Mac and the Apex One Console through Apex Central. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Administration > Account Management > User Accounts |
Agent Proxy Setting | |
---|---|
Description | Agents use the proxy settings configured when connecting to the Apex One server and the Trend Micro Smart Protection Network. |
Data Transmitted to Trend Micro | Proxy user name |
Feature Configuration Location | SSO to Apex One server Administration > Settings > Proxy
|
Apex Central Registration | |
---|---|
Description | You can register to a different on-premises Apex Central server if required (for example, you want to subscribe to Suspicious Object Lists from an on-premises Apex Central server). |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | Open to Apex One server Administration > Settings > Apex Central
|
Endpoint Location | |
---|---|
Description | Apex One classifies Security Agents that cannot connect to a configured reference server or gateway IP address as being in an external network. Security Agents in an external network apply different policy settings. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Agents > Endpoint Location |
Outbreak Prevention: Deny Write Access to Files and Folders | |
---|---|
Description | Configure to prevent viruses/malware from modifying or deleting files and folders on Security Agent endpoints. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Agents > Outbreak Prevention > Start Outbreak Prevention > Deny Write Access to Files and Folders |
Update Source | |
---|---|
Description | Security Agents can update from custom update sources. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Updates > Agents > Update Source > Customized Update Source List > Add |
Apex One Agent Management | |
---|---|
Description | Security Agents send the endpoint status and information to the Apex One server. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One server Agents > Agent Management |
Active Directory Integration | |
---|---|
Description | Apex One server can add the Active Directory domains for associated with the agent tree. |
Data Transmitted to Trend Micro | Domain name |
Feature Configuration Location | SSO to Apex One server Administration > Active Directory > Active Directory Integration |
Apex One (Mac) Console
Scan Now: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One (Mac) server Agents > Agent Management > Tasks > Scan Now |
Smart Feedback | |
---|---|
Description | Smart Feedback shares protected threat information with the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One (Mac) server Administration > Smart Feedback
|
Web Reputation Approved/Blocked URL List | |
---|---|
Description | The Approved/Blocked URL Lists contain URLs that Apex One™ (Mac) Security Agent does not monitor using Web Reputation. Web Reputation automatically takes the specified action according to the list type. |
Data Transmitted to Trend Micro | URL |
Feature Configuration Location | SSO to Apex One (Mac) server Agents > Global Agent Settings > Web Reputation Approved/Blocked URL List |
Certified Safe Software Service | |
---|---|
Description | Certified Safe Software Service queries Trend Micro data centers to verify the safety of a program detected by Malware Behavior Blocking, Event Monitoring, Firewall, or antivirus scans. |
Data Transmitted to Trend Micro |
|
Feature Configuration Location | SSO to Apex One (Mac) server Agents > Global Agent Settings > Certified Safe Software Service
|
Standard Notifications | |
---|---|
Description | Apex One (Mac) server sends notifications to the specified recipients when a security risk is detected. |
Data Transmitted to Trend Micro | Email address |
Feature Configuration Location | SSO to Apex One (Mac) server Notifications > Standard Notification (Email) |
Outbreak Notifications | |
---|---|
Description | Apex One™ (Mac) server sends notifications to the specified recipients when a security outbreak occurs. |
Data Transmitted to Trend Micro | Email address |
Feature Configuration Location | SSO to Apex One (Mac) server Notifications > Outbreak Notification (Email) |