TM Endpoint Security Presentation
TM Endpoint Security Presentation
Endpoint Security
V1 Endpoint Security - Review
Server Workloads & User Endpoints Facing Different Threats
According to Gartner1, “An end-user endpoint is regularly
exposed to threats through email, websites, cloud services or
USB drives.
By contrast, threat actors target server workloads using software and configuration
vulnerabilities, lateral movement, and stolen employee credentials.
These differences in threat exposure create a need for distinct security requirements
and protection strategies for end-user endpoints and server workloads”
1. Gartner, Prioritizing Security Controls for Enterprise Servers and End-User Endpoints (Evgeny Mirolyubov, Peter Firstbrook, January 2023)
Laptop Desktop Server Virtual Public/ Part of Vision One platform; easy
Private expansion to other native security
Server Cloud
solutions, XDR, and ASRM
Device Control
Firewall
Application Control
Virtualization Protection
EDR – XDR
Vision
WebOne
Management
V Endpoint Console
1 Security
Security
Agents
Fuente: https://docs.trendmicro.com/en-us/documentation/article/trend-vision-one-firewallexceptionsam_001#GUID-F8FAF1DF-7A1E-4C0A-ADA3-6F6FC6CAD49D-ia3nqu
Only the root user has the ability to initiate the update to Trend Vision All other non-root Master Administrators are presented with a similar information window,
One. but theirs contains a message to contact the root user to initiate the update.
Identities in Trend Vision One after the update to the new IAM rely on email addresses
instead of usernames. As part of the update, the user is prompted to enter an email address
for the primary user account.
21 | ©2024 Trend Micro Inc.
Instance Provisioning – Existing customers
Customers who already have Trend Micro endpoint security products, such as Apex One as a Service, already connected to Trend Vision One will require
an update to take advantage of the new feature in Trend Vision One, including Endpoint Security. No changes or updates to installed security agents are
required.
Identities in Trend Vision One after the update to the new IAM rely on email addresses On the Verify Email Address tab, type the code listed in the email and click
instead of usernames. As part of the update, the user is prompted to enter an email address Submit
for the primary user account.
22 | ©2024 Trend Micro Inc.
Instance Provisioning – Existing customers
Customers who already have Trend Micro endpoint security products, such as Apex One as a Service, already connected to Trend Vision One will require
an update to take advantage of the new feature in Trend Vision One, including Endpoint Security. No changes or updates to installed security agents are
required.
A new password for the account must be provided. Enter and confirm a new password
and click Reset Password
23 | ©2024 Trend Micro Inc.
Instance Provisioning – Existing customers
Customers who already have Trend Micro endpoint security products, such as Apex One as a Service, already connected to Trend Vision One will require
an update to take advantage of the new feature in Trend Vision One, including Endpoint Security. No changes or updates to installed security agents are
required.
Vision
WebOne
Management
V Endpoint Console
1 Security
Select
product
Select targets
Define settings
Deploy
Select
product
Select targets
Define settings
Deploy
Select
product
Select targets
Define settings
Deploy
Select
product
Select targets
Define settings
Deploy
• Create User-based Application Control rules and Device Control rules based on Active
Directory users and groups.
Data Loss Prevention in Vision One Endpoint Security provides the following features:
• Digital Asset Control
• Data Discovery
• Device Control
Create Create
Create
Data Template
Identifiers
Policy
• Expression Combine
• Template
s identifiers to
• Channel
• Attributes create condition
• Action
• Keywords statements
Create
Data
Identifiers
• Expressions
• Attributes
• Keywords
Create
Data
Identifiers
• Expressions
• Attributes
• Keywords
Create
Data
Identifiers
• Expressions
• Attributes
• Keywords
Create Create
Create
Data Template
Identifiers
Policy
• Expression Combine
• Template
s identifiers to
• Channel
• Attributes create condition
• Action
• Keywords statements
Create
Template
Combine
identifiers to
create condition
statements
Create Create
Create
Data Template
Identifiers
Policy
• Expression Combine
• Template
s identifiers to
• Channel
• Attributes create condition
• Action
• Keywords statements
Create
Policy
• Template
• Channel
• Action
Templat Channel Action
e
Create
Policy
• Template
• Channel
• Action
Create
Policy
• Template
• Channel
• Action
Create
Policy
• Template
• Channel
• Action
Create
Policy
• Template
• Channel
• Action
Event on network
Basic
information of
the selected alert
Visualization
of alert with
click and drag
nodes
Event objects
that triggered
the alert
Entities affected
by the alert
Change status
of the alert
The findings
of the alert
investigation.
Add notes to
document
actions
performed.
View details of
MITRE
technique or
type of malware
used
Click View
Event to create a
new search
query with the
event
Actions
•include:
Add to Block List
• Remove from Block
List
• Terminate
• Collect File
Right-click any • Block Sender
object to view • Quarantine Message
available actions • Delete Message
(menu varies • Isolate Endpoint
• Restore Connection
depending on the
• Start Remote Shell
type of object) Session