Views:

Trend Vision One Integration

Integration with Trend Vision One allows Apex Central to forward detection events and Security Agent information from managed Apex One servers to Trend Vision One for correlated detection and other advanced analytics.

Data Transmitted to Trend Micro
  • Endpoint name
  • Endpoint IP address
  • MAC address
  • User name
  • AD user name
  • AD group name
  • Policy rule name
  • File name
  • File path
  • File owner
  • File certificate signer
  • Process name / path / owner
  • Registry key
  • Registry value name
  • Registry value data
  • Registry dump
  • Command line
  • Windows event log
  • URL
  • Email sender
  • Email subject
  • Email recipients
  • FTP user
  • Rule name
  • Forensic data
Feature Configuration LocationApex One console
Administration > Settings > Apex Central
  • Apex Central registration

    Integration

Apex Central Console
Administration > Trend Vision One > Integration Settings

  • Forward detection logs and endpoint information to Trend Vision One

    Apex Central to Vision One

Back to top


Apex Central Console

Trend Vision One Integration
DescriptionIntegration with Trend Vision One allows Apex Central to forward detection events and Security Agent information from managed Apex One servers to Trend Vision One for correlated detection and other advanced analytics.
Data Transmitted to Trend Micro
  • Endpoint name
  • Endpoint IP address
  • MAC address
  • User name
  • AD user name
  • AD group name
  • Policy rule name
  • File name
  • File path
  • File owner
  • File certificate signer
  • Process name / path / owner
  • Registry key
  • Registry value name
  • Registry value data
  • Registry dump
  • Command line
  • Windows event log
  • URL
  • Email sender
  • Email subject
  • Email recipients
  • FTP user
  • Rule name
  • Forensic data
Feature Configuration LocationApex One console
Administration > Settings > Apex Central
  • Apex Central registration

    Integration

Apex Central Console
Administration > Trend Vision One > Integration Settings

  • Forward detection logs and endpoint information to Trend Vision One

    Apex Central to Vision One

Active Directory Synchronization
DescriptionActive Directory synchronization maps the User/Endpoint Directory according to your existing organizational structure.
Data Transmitted to Trend MicroActive Directory site information
  • AD site GUID (Guid)
  • AD site name (Name)
  • AD site location (Location)
  • AD site subnet name (subnet name)
  • AD site subnet range (subnet range)
  • Active Directory group information
  • AD group GUID (objectGUID)
  • AD group common name (cn)
  • AD group distinguished name (distinguishedName)
  • AD group member (member)
  • AD group SID (objectSid)
  • Organizational Unit information
  • OU GUID (objectguid)
  • OU name (name)
  • OU distinguished name (distinguishedname)
  • OU last logon time (lastLogonTimestamp)
  • User information
  • User account name (sAMAccountName)
  • User distinguished name (distinguishedName)
  • Manager (manager)
  • Direct reports (directReports)
  • User GUID (objectGUID)
  • Email addresses (mail, proxyAddresses)
  • Job title (title)
  • Department (department)
  • Telephone numbers (telephoneNumber, homePhone)
  • Office name (physicalDeliveryOfficeName)
  • Principal name (userPrincipalName)
  • Display name (displayName)
  • User SID (objectSID)
  • User account properties (userAccountControl)
Feature Configuration LocationApex Central console
Administration > Settings > Active Directory and Compliance Settings
  • Enable Active Directory Synchronization and authentication

    Active Directory Sync

User Accounts
DescriptionUser account information includes personal data.
Data Transmitted to Trend MicroUser account information
  • User name
  • Full name
  • Password
  • Email address
  • Telephone number
  • Mobile phone number
Feature Configuration LocationApex Central console
Administration > Account Management > User Accounts
  • Add
  • Edit

User Account

Contact Groups
DescriptionContact Groups for event notifications can include manually added email addresses for additional recipients.
Data Transmitted to Trend MicroEmail address
Feature Configuration LocationApex Central console
Detections > Notifications > Contact Groups
  • Additional recipients

Contact Group

Application Control Criteria
DescriptionApplication Control supports different types of Application Control Criteria for filtering.
Data Transmitted to Trend Micro
  • File path
  • File name
  • File certificate signer
  • Description of hash values
Feature Configuration LocationApex Central console
Policies > Policy Resources > Application Control Criteria > [new or existing policy resources]
  • In File paths match method, type the file path information

    App Control: File Path

  • In Certificates match method, type the certificate properties

    App Control: Certificate Properties

  • In Hash values match method, type information in the Description field

    App Control Hash1

  • In Hash values match method, import an existing hash values file that specifies file path information

    App Control Hash2

DLP Data Identifiers
DescriptionKeyword lists contain special words or phrases that define digital assets belonging to your organization.
Data Transmitted to Trend MicroKeywords
Feature Configuration LocationApex Central console Policies > Policy Resources > DLP Data Identifiers > Keyword Lists
  • Add
  • Edit (Click the Name of a list to edit keywords)
  • Copy
  • Import

DLP

Historical Investigation
DescriptionHistorical Investigations can quickly identify endpoints which are possible candidates for further analysis.
Data Transmitted to Trend Micro
  • User name
  • File name
  • FQDN / IP address / Host name
  • Destination URL
  • Registry key
  • Registry value name
  • Registry value data
  • CLI command
Feature Configuration LocationApex Central console
Response > Historical Investigation
  • Assessment > User-defined [criteria]

Historical

Live Investigation: Scan disk files using OpenIOC
DescriptionLive Investigations perform the investigation on the current system state. Live Investigations can be configured to run at specific periods, and also support a wider set of criteria through the use of OpenIOC and YARA rules.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
  • Response > Live Investigation > One-time investigation
    • Scan disk files using OpenIOC > Upload OpenIOC File
  • Response > Live Investigation > Scheduled Investigation
    • Scan disk files using OpenIOC > Upload OpenIOC File

OpenIOC

Live Investigation: Search registry
DescriptionLive Investigations perform the investigation on the current system state. Live Investigations can be configured to directly search registry keys, names, and data stored in the Windows Registry database to investigate registry changes.
Data Transmitted to Trend Micro
  • Registry key
  • Registry value name
  • Registry value data
Feature Configuration LocationApex Central console
  • Response > Live Investigation > One-time Investigation
    • Search registry
  • Response > Live Investigation > Scheduled Investigation
    • Search registry

Live Investigation: Search Registry

Managed Detection and Response Service
DescriptionThe Managed Detection and Response Service sends threat investigation data to the Trend Micro Threat Investigation Center to investigate and help identify potential attacks on your environment.
Data Transmitted to Trend Micro
  • Endpoint name
  • User name
  • File name / path / owner
  • Process name / path / owner
  • Registry dump
  • URL
  • IP address
  • File sample
  • MAC address
  • Windows event logs
    • User account name
    • User account domain
    • Endpoint name
Feature Configuration LocationApex Central console
Response > Managed Detection and Response > Settings
  • Unregister

MDR

Syslog Forwarding Service
DescriptionWith the syslog forwarding service enabled, Apex Central will forward logs to the specified syslog server.
Data Transmitted to Trend Micro
  • Endpoint name
  • User name
  • File name / path / owner
  • Process name / path / owner
  • Registry dump
  • URL
  • IP address
  • MAC address
Feature Configuration LocationApex Central console
Administration > Settings > Syslog Settings
  • Enable syslog forwarding

Syslog

Back to top


Apex One Security Agent Policy Settings

Application Control
DescriptionApplication Control prevents unwanted and unknown applications from executing on your endpoints.
Data Transmitted to Trend Micro
  • User name
  • File name
  • File path
  • File certificate signer
  • Process owner name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings
  • Enable Application Control

App Control

Application Control: Active Directory accounts
DescriptionYou can specify the user or group names of Active Directory accounts that specific Application Control criteria apply to.
Data Transmitted to Trend Micro
  • AD user name
  • AD group name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings > Assign Rule
  • Type user or group name of Active Directory accounts

App Control: AD

Behavior Monitoring: Approved/Blocked Program lists
DescriptionThe Behavior Monitoring exception list contains programs that the Security Agent does not monitor using Behavior Monitoring. Behavior Monitoring automatically takes the specified action according to the list type.
Data Transmitted to Trend Micro
  • File name
  • Full program path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Behavior Monitoring Settings > Exceptions

Behavior Monitoring

Data Loss Prevention
DescriptionData Loss Prevention monitors endpoints and network traffic and can prevent the transmission of sensitive information.
Data Transmitted to Trend Micro
  • User name
  • Domain
  • Process name
  • Process
  • Source
  • Destination
  • Email sender
  • Email subject
  • Email recipients
  • URL
  • FTP user
  • Rule name
  • Forensic data
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One DLP > [new or existing rule] > Action
  • Record data

DLP: Record Data

Data Loss Prevention Exceptions
DescriptionThe Data Loss Prevention Exceptions list contains network locations that the Security Agent does not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type.
Data Transmitted to Trend Micro
  • IP address
  • Endpoint name
  • FQDN
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One DLP > Exceptions

DLP Exception

Data Discovery
DescriptionData Discovery searches endpoints for the presence of sensitive information.
Data Transmitted to Trend Micro
  • Endpoint domain
  • User name
  • User domain
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One Data Discovery
  • Enable Data Discovery

Data Discovery

Device Control
DescriptionTo add a rule for specific AD user to control (allow, block, restrict access) user's devices.
Data Transmitted to Trend MicroAD User account
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents Add Device Control Rule

Device Control

Device Control: Allowed Programs
DescriptionThe Device Control Allowed Programs list contains program or publisher names that the Security Agent does not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices.
Data Transmitted to Trend Micro
  • Program path
  • File name
  • Digital signature provider
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents > All users (default) > Allowed Programs

Device Control: Allowed Programs

Manual Scan Exclusion (Directories)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Manual Scan.
Data Transmitted to Trend MicroDirectory path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Directories)

Manual Scan Exclusion Directories

Endpoint Sensor
DescriptionEndpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform Historical Investigations to discover hidden threats throughout your network and locate all affected endpoints.
Data Transmitted to Trend Micro
  • Command line
  • File name
  • File owner
  • File signer
  • Host name
  • IP address
  • Process owner
  • Registry data
  • User name
  • URL
  • Windows event log
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Endpoint Sensor Settings
  • Enable Endpoint Sensor

Endpoint Sensor

Endpoint Sensor: Attack Discovery
DescriptionAttack Discovery identifies threats using Indicators of Attack (IoA), and logs detections that match known indicators. Attack Discovery shares threat information with Smart Feedback and Threat Investigation Center.
Data Transmitted to Trend Micro
  • Command line
  • File name
  • File owner
  • File path
  • File signer
  • Host name
  • IP address
  • Process owner
  • User name
  • URL
  • Windows event log
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Endpoint Sensor Settings > Advanced Settings
  • Enable event recording
  • Enable Attack Discovery to detect known attack indicators on endpoints

Attack Discovery

Manual Scan: Scan Exclusion List (Files)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Manual Scan.
Data Transmitted to Trend Micro
  • File Name
  • Directory path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Files)

Scan Exclusion: Files

Predictive Machine Learning Exception List
DescriptionThe Predictive Machine Learning Exception List contains file hashes that the Security Agent does not scan during Predictive Machine Learning scanning.
Data Transmitted to Trend MicroNotes
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Predictive Machine Learning Setting > Exceptions > Add file hash

PML Exception

Real-time Scan: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Real-time Scan Settings
  • Enable virus/malware scan

RTS Exclusion: Malware Detection

Real-time Scan: Scan Exclusion List (Directories)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Real-time Scan.
Data Transmitted to Trend Micro
  • Directory path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Directories)

RTS Exclusion: Directories

Real-time Scan: Scan Exclusion List (Files)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Real-time Scan.
Data Transmitted to Trend Micro
  • Directory path
  • File Name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Files)

RTS Exclusion: Files

Scan Now: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings
  • Enable virus/malware scan

Scan Now: Malware Detection

Scan Now: Scan Exclusion List (Directories)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Scan Now.
Data Transmitted to Trend MicroDirectory path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (Directories)

Scan Now Exclusion: Directories

Scan Now: Scan Exclusion List (Files)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during Scan Now.
Data Transmitted to Trend Micro
  • Directory path
  • File name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (File)

Scan Now Exclusion: Files

Scheduled Scan: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scheduled Scan Settings

Scheduled Scan: Malware Detection

Scheduled Scan: Scan Exclusion List (Directories)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Scheduled Scan.
Data Transmitted to Trend MicroDirectory path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Directories)

Scheduled Scan Exclusion: Directories

Scheduled Scan: Scan Exclusion List (Files)
DescriptionThe Scan Exclusion Lists contain directories/file names that the Security Agent does not scan during a Scheduled Scan.
Data Transmitted to Trend Micro
  • Directory path
  • File name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Files)

Scheduled Scan Exclusion: Files

Suspicious Connection Detection
DescriptionSuspicious Connection manages the User-defined and Global IP C&C lists, and monitors the behavior of connections that endpoints make to potential C&C servers.
Data Transmitted to Trend MicroIP address
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Suspicious Connection Settings
  • Detect network connections made to addresses in the Global C&C IP list

Suspicious Connection

Trusted Program List
DescriptionAdd programs to the Trusted Programs List to exclude processes from suspicious activity monitoring. The programs should have a valid digital signature.
Data Transmitted to Trend MicroProgram full path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Trusted Program List

TPL

Web Reputation Service: Approved/Blocked URL List
DescriptionThe Approved/Blocked URL Lists contain URLs that the Security Agent does not monitor using Web Reputation. Web Reputation automatically takes the specified action according to the list type.
Data Transmitted to Trend MicroURL
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Web Reputation Settings > External Agents/Internal Agents > Approved/Blocked URL List

WRS

Vulnerability Protection
DescriptionVulnerability Protection automates the application of virtual patches before official patches become available.
Data Transmitted to Trend Micro
  • IP address
  • MAC address
  • Application name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Vulnerability Protection Settings
  • Enable Vulnerability Protection

VP

Back to top


Apex One (Mac) Policy Settings

Device Control
DescriptionEnable Device Control and set permission to Read Only or Block. When the Apex One (Mac) Security Agent detects and blocks a device, the system generates a log entry.
Data Transmitted to Trend MicroDevice Name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Device Control Settings

Device Control

Endpoint Sensor Settings
DescriptionEndpoint Sensor is a powerful monitoring and investigation tool that identifies the presence, location, and entry point of threats based on endpoint information (such as computer name, IP address, domain file, and processes).
Data Transmitted to Trend Micro
  • File name
  • File path
  • File signer
  • IP address
  • Process name
  • Process command
  • Host name
  • URL
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Endpoint Sensor Settings
  • Enable Endpoint Sensor

Endpoint Sensor

Manual Scan: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Manual Scan Settings

Manual Scan

Predictive Machine Learning
DescriptionPredictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks.
Data Transmitted to Trend Micro
  • URL
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Predictive Machine Learning Settings
  • Enable Predictive Machine Learning

PML

Real-time Scan: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks based on the file operation performed.
Data Transmitted to Trend Micro
  • File path
  • File name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Real-time Scan Settings
  • Enable Real-time Scan

RTS

Scan Exclusion Settings
DescriptionThe Scan Exclusion Lists contain directories and file extensions that Apex One (Mac) Security Agent does not scan.
Data Transmitted to Trend Micro
  • File path
  • File name
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Scan Exclusion Settings
  • Enable scan exclusion

Scan Exclusion

Scheduled Scan: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Scheduled Scan Settings
  • Specify path or full path

Scheduled Scan: Malware Detection

Trusted Program List
DescriptionAdd programs to the Trusted Programs List to exclude processes from suspicious activity monitoring.
Data Transmitted to Trend MicroProgram full path
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Trusted Program List

TPL

Web Reputation Service
Description

Web reputation technology tracks the credibility of web domains accessed by endpoints.

 

Apex One (Mac) Security Agent sends queries to the Trend Micro Global Smart Scan Server for the following:

  • External agents
  • Agents that are unable to connect to the Smart Protection Server (standalone or integrated)

When the Send queries to Smart Protection Servers option is not selected.

 
Data Transmitted to Trend MicroURL
Feature Configuration LocationApex Central console
Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Web Reputation Settings
  • Enable Web Reputation policy (External Agents)

    WRS1

  • Enable Web Reputation policy (Internal Agents)

    WRS2

Back to top


Apex One Console

Configuring Global User-defined IP List Settings
DescriptionAdministrators can configure Apex One to allow, block, or log all connections between agents and user-defined C&C IP addresses.
Data Transmitted to Trend MicroIP Address
Feature Configuration LocationSSO to Apex One server
Agents > Global Agent Settings > Security Settings > Suspicious Connection Settings > Edit User-defined IP List

IP List

Firewall: Policy Exception
DescriptionSecurity Agents can perform specific actions on network traffic (block or allow) that meets the exception criteria for the traffic direction (inbound or outbound).
Data Transmitted to Trend Micro
  • Program full path
  • Host name
  • Registry Key
  • IP Address
Feature Configuration LocationSSO to Apex One server
Agents > Firewall > Policies > Add/Edit Policy > Add Exception
  • Add

Firewall Exception

Firewall: Profile
DescriptionFirewall profiles provide flexibility by allowing you to choose the attributes that a single agent or group of agents must have before applying a policy.
Data Transmitted to Trend Micro
  • IP Address
  • Description
  • Domain
  • Logon User Name
Feature Configuration LocationSSO to Apex One server
Agents > Firewall > Profiles
  • Add

FW Profile

Apex One User Accounts
DescriptionIf you have an on-premises Apex Central server that you want to manage Trend Micro Security for Mac and the Apex One Console, you must create a user account to facilitate the communication between Trend Micro Security for Mac and the Apex One Console through Apex Central.
Data Transmitted to Trend Micro
  • User Name
  • Description
  • Email Address
Feature Configuration LocationSSO to Apex One server
Administration > Account Management > User Accounts

User Accounts

Agent Proxy Setting
DescriptionAgents use the proxy settings configured when connecting to the Apex One server and the Trend Micro Smart Protection Network.
Data Transmitted to Trend MicroProxy user name
Feature Configuration LocationSSO to Apex One server
Administration > Settings > Proxy
  • Server
  • Agent

Agent Proxy

Apex Central Registration
DescriptionYou can register to a different on-premises Apex Central server if required (for example, you want to subscribe to Suspicious Object Lists from an on-premises Apex Central server).
Data Transmitted to Trend Micro
  • IP address
  • User name
  • Apex One Logon URL
  • Apex Central Logon URL
Feature Configuration LocationOpen to Apex One server
Administration > Settings > Apex Central
  • Apex Central Server Settings

AC Registration

Endpoint Location
DescriptionApex One classifies Security Agents that cannot connect to a configured reference server or gateway IP address as being in an external network. Security Agents in an external network apply different policy settings.
Data Transmitted to Trend Micro
  • Gateway IP address
  • MAC Address
Feature Configuration LocationSSO to Apex One server
Agents > Endpoint Location

Endpoint Location

Outbreak Prevention: Deny Write Access to Files and Folders
DescriptionConfigure to prevent viruses/malware from modifying or deleting files and folders on Security Agent endpoints.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationSSO to Apex One server
Agents > Outbreak Prevention > Start Outbreak Prevention > Deny Write Access to Files and Folders

Outbreak Prevention

Update Source
DescriptionSecurity Agents can update from custom update sources.
Data Transmitted to Trend Micro
  • URL
  • IP address
Feature Configuration LocationSSO to Apex One server
Updates > Agents > Update Source > Customized Update Source List > Add

Update Source

Apex One Agent Management
DescriptionSecurity Agents send the endpoint status and information to the Apex One server.
Data Transmitted to Trend Micro
  • Computer Name
  • Logon User Name
  • IP Address
  • MAC Address
Feature Configuration LocationSSO to Apex One server
Agents > Agent Management

Agent Management

Active Directory Integration
DescriptionApex One server can add the Active Directory domains for associated with the agent tree.
Data Transmitted to Trend MicroDomain name
Feature Configuration LocationSSO to Apex One server
Administration > Active Directory > Active Directory Integration

AD Integration

Back to top


Apex One (Mac) Console

Scan Now: Malware detection
DescriptionVirus/Malware scanning checks files for known security risks.
Data Transmitted to Trend Micro
  • File name
  • File path
Feature Configuration LocationSSO to Apex One (Mac) server
Agents > Agent Management > Tasks > Scan Now

Scan Now Malware Detection

Smart Feedback
DescriptionSmart Feedback shares protected threat information with the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats.
Data Transmitted to Trend Micro
  • URL
  • File name
  • File path
  • Suspicious executable files
Feature Configuration LocationSSO to Apex One (Mac) server
Administration > Smart Feedback
  • Enable Trend Micro Smart Feedback (recommended)

Smart Feedback

Web Reputation Approved/Blocked URL List
DescriptionThe Approved/Blocked URL Lists contain URLs that Apex One™ (Mac) Security Agent does not monitor using Web Reputation. Web Reputation automatically takes the specified action according to the list type.
Data Transmitted to Trend MicroURL
Feature Configuration LocationSSO to Apex One (Mac) server
Agents > Global Agent Settings > Web Reputation Approved/Blocked URL List

WRS

Certified Safe Software Service
DescriptionCertified Safe Software Service queries Trend Micro data centers to verify the safety of a program detected by Malware Behavior Blocking, Event Monitoring, Firewall, or antivirus scans.
Data Transmitted to Trend Micro
  • File name
  • Company
Feature Configuration LocationSSO to Apex One (Mac) server
Agents > Global Agent Settings > Certified Safe Software Service
  • Enable Certified Safe Software Service for antivirus scan

CSSS

Standard Notifications
DescriptionApex One (Mac) server sends notifications to the specified recipients when a security risk is detected.
Data Transmitted to Trend MicroEmail address
Feature Configuration LocationSSO to Apex One (Mac) server
Notifications > Standard Notification (Email)

Standard Notification

Outbreak Notifications
DescriptionApex One™ (Mac) server sends notifications to the specified recipients when a security outbreak occurs.
Data Transmitted to Trend MicroEmail address
Feature Configuration LocationSSO to Apex One (Mac) server
Notifications > Outbreak Notification (Email)

Outbreak Notification

Back to top