General Product Operation
Active Directory Synchronization | |
---|---|
Description | Active Directory synchronization maps the User/Endpoint Directory according to your existing organizational structure. |
Data Collected | Active Directory site information:
Active Directory group information:
Organizational Unit information:
User information:
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Administration > Settings > Active Directory and Compliance Settings |
Console Settings | Enable Active Directory Synchronization |
Contact Groups | |
---|---|
Description | Contact Groups for event notifications can include manually added email addresses for additional recipients. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Logs & Reports > Notifications > Contact Groups |
Console Settings | Additional recipients |
Application Control Criteria | |
---|---|
Description | Application Control supports different types of Application Control criteria for filtering. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Resources > Application Control Criteria > [new or existing policy resources] |
Console Settings |
DLP Data Identifiers | |
---|---|
Description | Keyword lists contain special words or phrases that define digital assets belonging to your organization. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Resources > DLP Data Identifiers > Keyword Lists |
Console Settings |
|
Live Investigation: Scan disk files using OpenIOC | |
---|---|
Description | Live Investigation performs threat investigations on the current system state. It can be configured to run at specific periods and support a wider set of criteria through the use of OpenIOC and YARA rules. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection
|
Console Settings | Upload OpenIOC File |
Live Investigation: Search registry | |
---|---|
Description | Live Investigation performs threat investigations on the current system state. It can be configured to directly search registry keys, names, and data stored in the Windows Registry database for changes. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection
|
Console Settings | Search registry |
Syslog Forwarding Service | |
---|---|
Description | With the Syslog forwarding service enabled, Apex Central can forward logs to the specified syslog server. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Administration > Settings > Syslog Settings |
Console Settings | Enable syslog forwarding |
Troubleshooting Settings | |
---|---|
Description | Troubleshooting Settings allow Trend Micro Support to collect information during the troubleshooting process to resolve issues related to the Security Agent program. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Administration > Settings > Troubleshooting Settings |
Console Settings |
Apex One Security Agent Policy Settings
Application Control | |
---|---|
Description | Application Control prevents unwanted and unknown applications from executing on your endpoints. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings |
Console Settings | Enable Application Control |
Application Control: Active Directory accounts | |
---|---|
Description | You can specify the user or group names of Active Directory accounts to apply Application Control criteria to. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Application Control Settings > Assign Rule |
Console Settings | Type the user or group name of Active Directory accounts |
Behavior Monitoring | |
---|---|
Description | Behavior Monitoring provides an additional layer of protection against programs that exhibit malicious behavior. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Behavior Monitoring Settings > Rules > Malware Behavior Blocking |
Console Settings | Enable Malware Behavior Blocking |
Behavior Monitoring: Approved/Blocked Program lists | |
---|---|
Description | Behavior Monitoring: Approved/Blocked Program lists |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Behavior Monitoring Settings > Exceptions |
Console Settings |
Data Loss Prevention | |
---|---|
Description | Data Loss Prevention |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One DLP > [new or existing rule] > Action |
Console Settings | Record data |
Data Loss Prevention Exceptions | |
---|---|
Description | The Data Loss Prevention Exceptions list contains network locations that Security Agents do not monitor for sensitive information. Data Loss Prevention automatically takes the specified action according to the list type. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One (Mac) > [new or existing policy] > Device Control Settings |
Console Settings |
Data Discovery | |
---|---|
Description | Data Discovery searches endpoints for the presence of sensitive information. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Data Loss Prevention > [new or existing policy] > Apex One Data Discovery |
Console Settings | Enable Data Discovery |
Device Control | |
---|---|
Description | Configure Device Control rules to control access to storage devices for specific Active Directory users. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents |
Console Settings | Add Device Control Rule |
Device Control: Allowed Programs | |
---|---|
Description | The Device Control Allowed Programs list contains program or publisher names that Security Agents do not block using Device Control. Programs in the specified path or by the specified publisher can execute or perform read/write operations on files in restricted storage devices. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Device Control Settings > External Agents/Internal Agents > All users (default) > Allowed Programs |
Console Settings |
Manual Scan: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion List contains directories that Security Agents do not scan during a Manual Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Console Settings |
Manual Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion List contains file names that Security Agent do not scan during a Manual Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Manual Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Console Settings |
Predictive Machine Learning | |
---|---|
Description | Predictive Machine Learning performs in-depth file analysis to detect emerging unknown security risks. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Predictive Machine Learning Settings |
Console Settings |
Predictive Machine Learning: Exception List | |
---|---|
Description | The Predictive Machine Learning Exception List contains the hash values of files that Security Agents do not scan during Predictive Machine Learning scanning. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Predictive Machine Learning Setting > Exceptions > Add file |
Console Settings |
Real-time Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Real-time Scan Settings |
Console Settings | Enable virus/malware scan |
Real-time Scan: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion List contains directories that Security Agents do not scan during a Real-time Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Console Settings |
Real-time Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion List contains file names that Security Agents do not scan during a Real-time Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Real-time Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Console Settings |
Sample Submission | |
---|---|
Description | Sample Submission enables Security Agents to send suspicious files that may contain previously unknown threats directly to Virtual Analyzer for further analysis. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Sample Submission Settings |
Console Settings | Enable suspicious file submission to Virtual Analyzer |
Scan Now: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings |
Console Settings | Enable virus/malware scan |
Scan Now: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion List contains directories that Security Agents do not scan during Scan Now. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (Directories) |
Console Settings |
Scan Now: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion List contains file names that Security Agents do not scan during Scan Now. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scan Now Settings > Scan Exclusion > Scan Exclusion List (Files) |
Console Settings |
Scheduled Scan: Malware detection | |
---|---|
Description | Virus/Malware scanning checks files for known security risks. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Scheduled Scan Settings |
Console Settings | Enable virus/malware scan |
Scheduled Scan: Scan Exclusion List (Directories) | |
---|---|
Description | The Scan Exclusion List contains directories that Security Agents do not scan during a Scheduled Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Directories) |
Console Settings |
Scheduled Scan: Scan Exclusion List (Files) | |
---|---|
Description | The Scan Exclusion List contains file names that Security Agents do not scan during a Scheduled Scan. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > Scheduled Scan Setting > Scan Exclusion > Scan Exclusion List (Files) |
Console Settings |
Suspicious Connection Detection | |||
---|---|---|---|
Description | Suspicious Connection manages the User-defined and Global IP C&C lists, and monitors the behavior of connections that endpoints make to potential C&C servers. | ||
Data Collected |
| ||
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Suspicious Connection Settings | ||
Console Settings | Detect network connections made to addresses in the Global C&C IP list |
Trusted Program List | |
---|---|
Description | Add programs (with a valid digital signature) to the Trusted Programs List to exclude processes from suspicious activity monitoring. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Trusted Program List |
Console Settings |
Web Reputation Service | |
---|---|
Description | Web Reputation tracks the credibility of web domains accessed by endpoints. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Web Reputation Settings > External/Internal Agents > Enable Web Reputation on the following operation systems |
Console Settings |
|
Web Reputation Service: Browser Exploit Prevention | |
---|---|
Description | Browser Exploit Prevention identifies web browser exploits and malicious scripts, and prevents the use of these threats from compromising web browsers. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Web Reputation Settings > External/Internal Agents > Browser Exploit Prevention |
Console Settings | Block pages containing malicious script |
Web Reputation Service: Approved/Blocked URL List | |
---|---|
Description | The Approved/Blocked URL List contains URLs that Security Agents do not monitor using Web Reputation. Web Reputation automatically takes the specified action according to the list type. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Web Reputation Settings > External Agents/Internal Agents > Approved/Blocked URL List |
Console Settings |
Vulnerability Protection | |
---|---|
Description | Vulnerability Protection automates the application of virtual patches before official patches become available. |
Data Collected |
|
Console Location | Endpoint Security Operations > Standard Endpoint Protection Policies > Policy Management > Apex One Security Agent > [new or existing policy] > Vulnerability Protection Settings |
Console Settings | Enable Vulnerability Protection |
Apex One Cloud Console
Smart Feedback | |
---|---|
Description | Smart Feedback shares protected threat information with the Smart Protection Network, allowing Trend Micro to rapidly identify and address new threats. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Administration > Smart Protection > Smart Feedback |
Console Settings | Enable Trend Micro Smart Feedback (recommended) |
Certified Safe Software Service | |
---|---|
Description | The Certified Safe Software Service queries Trend Micro data centers to verify the safety of a program detected by Malware Behavior Blocking, Event Monitoring, Firewall, or antivirus scans. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Global Agent Settings > System > Certified Safe Software Service Settings |
Console Settings | Enable the Certified Safe Software Service for Behavior Monitoring, Firewall, and antivirus scans |
User-defined IP List | |
---|---|
Description | Administrators can configure Apex One to allow, block, or log all connections between Security Agents and user-defined C&C IP addresses. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Global Agent Settings > Security Settings > Suspicious Connection Settings > Edit User-defined IP list |
Console Settings |
Firewall: Policy Exception | |
---|---|
Description | Security Agents can perform specific actions (block or allow) on network traffic that meets the exception criteria for the traffic direction (inbound or outbound). |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Firewall > Policies > Add/Edit Policy > Add Exception |
Console Settings | Add |
Firewall: Profile | |
---|---|
Description | Firewall profiles provide flexibility by allowing you to choose the attributes that a Security Agent or group of Security Agents must have before applying a policy. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Firewall > Profiles |
Console Settings | Add |
Endpoint Location | |
---|---|
Description | Apex One classifies Security Agents that cannot connect to a configured reference server or gateway IP address as being in an external network. Security Agents in an external network apply different policy settings. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Endpoint Location |
Console Settings |
Outbreak Prevention: Deny Write Access to Files and Folders | |
---|---|
Description | Configure this setting to prevent viruses/malware from modifying or deleting files and folders on Security Agent endpoints. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Agents > Outbreak Prevention > Start Outbreak Prevention > Deny Write Access to Files and Folders |
Console Settings |
Update Source | |
---|---|
Description | Security Agents can obtain component updates from custom update sources. |
Data Collected |
|
Console Location | Directories > Product Servers > SSO to Apex One Server Updates > Agents > Update Source > Customized Update Source List > Add |
Console Settings |