This course delivers a deep dive into the essential components of endpoint protection using TrendAI VisionOne™. The curriculum is structured to guide learners from foundational concepts to advanced administrative capabilities, ensuring a comprehensive understanding of endpoint security management in enterprise environments.
Module 1. Platform Introduction and Integration
Introduction to TrendAI Vision One™ This lesson introduces the TrendAI Vision One™
platform, highlighting its architecture, core capabilities, and strategic role in enterprise security. Learners will explore how the platform consolidates endpoint protection, visibility, and threat response into a unified interface, setting the stage for deeper technical exploration.
Product Instances in TrendAI Vision One ™EndpointSolution
Participants will learn about the different product instances available within TrendAI Vision One™, with focus on the Endpoint Security solution. The lesson explains how each instance contributes tothe broader security ecosystem and how to select the appropriate instance based on organizational needs.
Integrate Existing TrendAI ™Solutions to TrendAIVision One ™
This topic covers the integration process for existing TrendAI™ solutions into the TrendAI Vision One platform. Learners will gain hands-on experience connecting legacy or standalone products to create centralized, cohesive security environment.
Module 2: Agent Lifecycle Management
Agent Installation
This lesson provides detailed instruction on deploying endpoint agents using various methods, including manual, remote, and automated installations. It emphasizes best practices for ensuring successful deployment across diverse operating systems and network environments.
Uninstaller
Learners will explore the correct procedures for safely removing endpoint agents. The lesson covers scenarios such as decommissioning devices, troubleshooting failed installations, and ensuring clean uninstalls to prevent residual issues.
Inventory Report
This topic teaches students how to generate and interpret inventory reports. These reports provide visibility into deployed agents, their status, and configuration, enabling informed decision-making and compliance tracking.
Sensor Policy
Participants will learn how to configure sensor policies that govern data collection and monitoring behavior. The lesson explains how to tailor policies to meet organizational privacy, performance, and compliance requirements.
Global Setting
This section focuses on configuring global settings that apply across all endpoints. Learners will understand how to standardize protection levels, streamline administration, and enforce consistent security policies.
Module 3: Endpoint Operations and Protection
Endpoint Inventory Scan
This lesson teaches how to perform on-demand scans to assess endpoint health. Learners will use scanning tools to detect anomalies, identify outdated agents, and verify policy compliance.
Endpoint Inventory Remote Shell
Students will gain hands-on experience using the Remote Shell feature to access and troubleshoot endpoints remotely. This capability is essential for resolving issues without physical access to devices.
Endpoint Inventory Custom Script
This topic introduces the use of custom scripts for automating administrative tasks. Learners will write, deploy, and manage scripts to perform diagnostics, enforce configurations, and streamline operations.
Deployment and Configuration
This lesson consolidates best practices for deploying and configuring endpoint protection settings. It includes real-world scenarios to help learners apply configurations that align with organizational security goals.
Endpoint Protection
Participants will explore the core protection features of the platform, including malware detection, behavioural analysis, and exploit prevention. The lesson emphasizes proactive defense strategies and real-time threat mitigation.
Data Loss Prevention
This section introduces DLP policies and their role in preventing sensitive data exfiltration. Learners will configure rules to monitor and block unauthorized data transfers across endpoints.
Suspicious Object Distribution
Learners will understand how to manage and distribute suspicious object lists. This capability allows administrators to proactively block known threats across all protected endpoints.
Module 4: Administration, Investigation, and Reporting
User/Endpoint DirectoryThis lesson covers the management of user andendpoint directories within the platform. Studentswill learn how to organize, group, and assign roles tostreamline access control and policy enforcement.
Live Investigations
Participants will conduct real-time investigationsusing TrendAI Vision One™’s tools. The lessonincludes threat hunting techniques, incidentcorrelation, and response workflows to contain andremediate threats.
Security Posture
This topic teaches how to assess and improve theoverall security posture of endpoints. Learners willuse dashboards and analytics to identify gaps,prioritize remediation, and track progress over time
Logging and Reporting
Students will generate and analyze logs and reportsto support auditing, compliance, and operationalinsights. The lesson emphasizes the importance ofdata-driven decision-making in endpoint security.
Standard Endpoint Protection Administration
This final lesson summarizes the administrativeresponsibilities for maintaining endpoint protection.It reinforces best practices for ongoingmanagement, policy updates, and continuousimprovement.