1. Trend Micro Apex One Overview
- Key features of Trend Micro Apex One
- Trend Micro Apex One components
- Deployment methods
- Threat detection
2. Trend Micro Apex One Server
- Trend Micro Apex One server tasks
- Trend Micro Apex One database
- Installing the Trend Micro Apex One server
- Upgrading existing installation
- Trend Micro Apex One plug-ins and utilities
3. Trend Micro Apex One Web Console
- Logging into the console
- Integrating with Microsoft Active Directory
- Creating new administrative roles and accounts
4. Managing Security Agents
- Security agent tasks
- Security agent services and components
- Security agent requirements
- Installing/uninstalling agents
- Migrating from other endpoint security software
- Agent-to-server communication
- Endpoint location
- Agent self-protection
- Security agent settings
- Grouping security agents
5. Managing Off-Premises Agents
- Trend Micro Apex One Edge Relay Server
6. Keeping Trend Micro Apex One Up to Date
- Pattern updates
- Updating managed products
- Updating security agents
- Security compliance
7. Trend Micro™ Global Threat Intelligence
- Global threat intelligence services
- Configuring global threat intelligence sources
8. Protecting Endpoint Computers from Malware
- Scanning for malware
- Scan settings
- Quarantining malware
- Trend Micro™ SmartScan™
- Spyware/Grayware protection
- Preventing outbreaks
9. Protecting Endpoint Computers Through Behavior Monitoring
- Malware behavior blocking
- Ransomware protection
- Anti-exploit protection
- Fileless malware protection
- Newly encountered program detection
- Event monitoring
- Behavior monitoring exceptions
10. Protecting Endpoint Computers from Unknown Threats
- Common vulnerabilities and exposures exploits (CVE)
- Predictive machine learning
- Offline predictive machine learning
11. Blocking Web Threats
- Web reputation
- Detecting suspicious connections
- Protecting against browser exploits
12. Protecting Endpoint Computers Through Traffic Filtering
- Firewall filtering
- Application filtering
- Certified Safe Software list
- Stateful inspection
- Intrusion detection system
- Firewall policies and profiles
13. Preventing Data Loss on Endpoint Computers
- Digital asset control
- Configuring data identifiers, data loss prevention (DLP) templates, and policies
- Data discovery
- Device control
14. Deploying Policies Through Trend Micro Apex Central™
- Trend Micro Apex Central services
- Connecting Trend Micro Apex One to Trend Micro Apex Central
- Managing policies
- Policy inheritance
- Data discovery policies
15. Blocking Unapproved Applications on Endpoint Computers
- Integrating application control
- Lockdown mode
- Application control criteria
- Implementing application control
- User-based application control
- Application control best practices
16. Protecting Endpoint Computers from Vulnerabilities
- Integrating vulnerability protection
- Vulnerability protection pattern
- Selecting a priority mode
- Network engine settings
17. Integrating with Trend Vision One
- Trend Vision One capabilities
- Collecting telemetry
- Connecting Trend Micro Apex Central to Trend Vision One
- Endpoint inventory
- Endpoint basecamp
18. Introduction to XDR Threat Investigation
- Detection models
- Observed attack techniques
- Workbenches
- Searches
19. Detecting Emerging Malware Through Threat Intelligence
- Threat intelligence phases
- Threat intelligence requirements
- Suspicious objects
- Enabling sample submission
- Viewing suspicious objects