Apex Central Best Practices Guide For Malware Protection-V2 - Ju
Apex Central Best Practices Guide For Malware Protection-V2 - Ju
Original Title: Apex Central Best Practices Guide for Malware Protection-v2 _July2021
(1)
Full description
Save 0% 0% Embed Share
41 of 43 Search document
This document is...
Public Document
Information in this document is subject to change without notice. The names of companies, products,
people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real
individual, company, product, or event, unless otherwise noted. Complying with all applicable copyright laws is the
responsibility of the user.
No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the
express prior written consent of Trend Micro Incorporated.
All other brand and product names are trademarks or registered trademarks of their respective companies or
organizations.
Public Document
Table of Contents
TrendMicro Apex Central Best Practice Guide for Malware Protection .................................................................. 5
Policy Management............................................................................................................................................................. 6
Product: Apex One Security Agent .............................................................................................................................. 6
Configuring Scan Method............................................................................................................................................. 6
Configuring Manual Scan Settings ............................................................................................................................... 7
Configuring Real-time Scan Settings ........................................................................................................................... 7
Configuring Scheduled Scan Settings .......................................................................................................................... 8
Configuring Scan Now Settings ................................................................................................................................... 9
Table Summary ............................................................................................................................................................. 11
Enable Web Reputation .............................................................................................................................................. 11
Internal Agents:........................................................................................................................................................ 12
External Agents:....................................................................................................................................................... 12
Configure Global C&C Suspicious Connection Settings....................................................................................... 12
Enable Behavior Monitoring / Ransomware Protection Feature ........................................................................ 13
Malware behavior blocking ....................................................................................................................................14
Ransomware Protection.......................................................................................................................................... 15
Anti-Exploit Protection .......................................................................................................................................... 15
Newly Encountered Programs .............................................................................................................................. 16
Event Monitoring .................................................................................................................................................... 16
Enable Predictive Machine Learning ........................................................................................................................ 16
Fileless Malware Protection settings ......................................................................................................................... 18
Required Services ..................................................................................................................................................... 18
Enable File-less Malware Solution Features: ....................................................................................................... 19
Enable Sample Submission Feature .......................................................................................................................... 20
Disabling Independent Mode for Machine in the network................................................................................... 21
Configure Unload and Unlock protection ............................................................................................................... 21
Configure Uninstallation protection ......................................................................................................................... 21
Configure Apex One Agent self-protection............................................................................................................. 22
Configure Device Control .......................................................................................................................................... 22
Permissions for Storage devices ............................................................................................................................ 23
Enabling Endpoint Sensor..........................................................................................................................................23
Enabling Application Control Integration ............................................................................................................... 24
Rules and Criteria..................................................................................................................................................... 25
This document is...
Advertisement
Public Document
Public Document
This document is...
Advertisement
Public Document
Apex Central is a security management solution that gives an administrator the ability to control the
enterprise products or appliances from a central location --regardless of the program or the appliance's
physical location or platform. It allows the formulation of effective deployment and response plans
Public Document
Policy Management
Policy management allows administrators to enforce product settings on managed products and endpoints
from a single management console. They create a policy by selecting the targets and configuring a list of
product settings.
• Behavioral analysis
Safeguards against scripts, injection, ransomware, memory and browser attacks.
• Available as a service
Rapid deployment and simplified administration and maintenance with the same comprehensive
enterprise threat protection as Trend Micro on-premises Apex One
Powered by the Trend Micro™ Smart Protection Network™, Trend Micro Apex One™ is a centrally
managed anti-malware solution that protects endpoints (servers, desktops, and portable endpoints) from a
wide variety of Internet threats. An integrated solution, Trend Micro Apex One consists of the Security Agent
that resides at the endpoint and the Apex One server that manages all Security Agents.
Security Agents report to the server from which they were installed. They send event information such as
threat detection, Security Agent startup, Security Agent shutdown, start of a scan, and completion of an
update to the server in real time.
This document is...
Advertisement
Public Document
Public Document
Scan the boot sector of the USB storage device after plugging in.
•
Joke: Quarantine
•
Trojans: Quarantine
•
Packer: Quarantine
•
19. Spyware/Grayware > Clean: Apex One terminates processes or delete registries, files, cookies and
shortcuts.
20. Click Deploy.
This document is...
Advertisement
Public Document
Public Document
• Joke: Quarantine
• Trojan: Quarantine
• Virus: Clean & Quarantine
• Test Virus: Quarantine
• Packer: Quarantine
• Probable Malware: Quarantine
• Other Malware: Clean & Quarantine
16. Enable Spyware/Grayware > Clean: Apex One terminates processes or delete registries, files,
cookies and shortcuts.
17. Click Deploy.
Try Scribd FREE for 30 days to access over 125 million titles without ads or
interruptions!
Public Document
Table Summary
Real-time Scan Manual Scan Scheduled Scan Scan Now
Files to scan All Scannable All Scannable All Scannable All Scannable
Enable Intellitrap ✓
Cleanup type for Damage Cleanup Services Advanced Cleanup Advanced Cleanup Advanced Cleanup
Public Document
4. On targets select Manage Targets and select target Apex One agents.
5. Select the Web Reputation Settings
Internal Agents:
External Agents:
Enable Web Reputation on operating system matching your policy created
•
• Untested URLs. You can use this option to Block pages that have not been tested by Trend
Micro
• Under Browser Exploit Prevention, enable Block pages containing malicious script.
• For Approved/Blocked URL list, you may add the URL’s of the Web sites you want to approve
or block. By default, TrendMicro and Microsoft websites are included in the Approved lists.
• Agent Log: Enable allow agents to send logs to Apex One Server. his option to analyze URL’s
blocked by Web Reputation Service.
• Click Deploy.
Administrators can configure Apex One to log all connections between agents and confirmed C&C IP
addresses. The Trend Micro Command & Control (C&C) Contact Alert Services provides enhanced
detection and alert capabilities to mitigate the damage caused by Advanced Persistent Threats (APT) and
targeted attacks.
The following are steps on how to configure it:
1. On the Apex Central, log on to the Management console.
2. Go to Policies > Policy Management.
3. Create or select the policy name created.
This document is...
Advertisement
Public Document
• Detect network connections made to addresses in the Global C&C IP list: Block
• Detect connections using malware network fingerprinting: Block
• Clean suspicious connections when C&C callback is detected
Public Document
Make sure to enable the required services for the appropriate Windows platform in Additional
Service Setting area.
To enable, follow these steps;
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Create or Select the Policy Name created.
4. On targets select Manage Targets and select target Apex One agents.
5. Go to Additional Service Settings.
6. Under Unauthorized Change Prevention Service:
• Check Enable Windows desktops.
• Check Enable Windows Server Platforms.
• Check Full Mode.
To configure Behavior Monitoring and Ransomware Protection features, please do the following:
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Create or Select the Policy Name created.
4. On targets select Manage Targets and select target Apex One agents.
5. Go to Behavior Monitoring Settings.
This document is...
Advertisement
Public Document
Ransomware Protection
Ransomware is a type of malware which restricts access to files and demands payment to restore the
affected files. This type of threat can affect multiple files residing on your local and connected drives,
it can also affect backups such as shadow copies. Ransomware Protection prevents the unauthorized
modification or encryption of files on Apex One agents by “ransomware” threats.
NOTE To reduce the chance of Apex One detecting a safe process as malicious, ensure
that the agent has internet access to perform additional verification processes using Trend Micro
servers.
• Check Enable program inspection to detect and block compromised executable files.
NOTE Program inspection provides increased security if you select “Known and potential
threats” in the Threat to block drop-down
Anti-Exploit Protection
Anti-exploit protection works in conjunction with program inspection to monitor the behavior of
programs and detect abnormal behavior that may indicate that an attacker has exploited program
vulnerability. Once detected, Behavior Monitoring terminates the program processes.
NOTE Anti – exploit Protection requires that you select Enable program inspection to
detect and block compromised executable files
Public Document
NOTE This notification requires that Administrators enable Real – time Scan and
web Reputation
Event Monitoring
Event Monitoring provides a more generic approach to protecting against unauthorized software and
malware attacks. It monitors system areas for certain events, allowing administrators to regulate
programs that trigger such events. Use Event Monitoring if you have specific system protection
requirements that are above and beyond what is provided by Malware Behavior Blocking.
This document is...
Advertisement
Public Document
NOTE Predictive Machine Learning attempts to clean the files that executed the
malicious processes. If the clean action is unsuccessful, Apex One quarantines the affected
files.
7. Under Exceptions, configure the global Predictive Machine Learning file exceptions to prevent all
agents from detecting a file as malicious.
8. Click Add file hash.
Public Document
a. Specify the file SHA-1 hash value to exclude from scanning.
b. Provide a note regarding the reason from the exception or to describe the file name(s)
associate with the hash value. (Optional)
c. Click Add.
9. Apex One will add the file hash to the exception lists.
10. Click Deploy.
This document is...
Advertisement
Public Document
NOTE Administrators can opt to enable the services and features to Windows
Server Platforms should higher security is required for those machines.
RealTimeScanSettings
1. Go to Policies > Policy Management
2. Select the policy to which the settings will be applied
3. Expand Real Time Scan Settings
4. Check Enable Virus/Malware Scan
5. Select Target
6. Check Quarantine Malware Variants Detected in Memory
PredictiveMachineLearning
1. Go to Policies > Policy Management
2. Select the policy to which the settings will be applied
3. Expand Predictive Machine Learning Settings
4. Check Enable Predictive Machine Learning
5. Under Detection Settings
a. Check File for File Scanning and Select Quarantine for Action
b. Check Process for Process Scanning and Select Terminate for Action
Public Document
NOTE Virtual Analyzer requires a valid license for each required product/service or
contact your service provider to obtain an Activation Code.
Try Scribd FREE for 30 days to access over 125 million titles without ads or
interruptions!
This document is...
Public Document
Public Document
This document is...
Advertisement
Public Document
access to these devices or limit the level of access. Limiting the level of access brings up “Program
lists” which allows programs on storage devices to have Modify, Read and execute, Read and List
device content only.
• Configure the list of approved USB storage devices. Device Control allows you to block access to all
USB storage devices, except those that have been added to the list of approved devices. You can
grant full access to the approved devices or limit the level of access
• Configure the settings according to your preference.
NOTE Endpoint Sensor feature requires special licensing. Make sure that you have the
correct license before deploying Endpoint Sensor policies to endpoints. Contact your support
provider for more information.
Public Document
Apex Central SaaS
Each managed product provides different policy settings that you can configure and deploy to policy targets.
You can find a complete list of supported managed products and the policy settings for each in the Apex
Central as a Service Widget and Policy Management Guide.
This document is...
Advertisement
Public Document
https://docs.trendmicro.com/en-us/enterprise/apex-central.aspx
You can also view the guide online using the following link:
https://docs.trendmicro.com/en-us/enterprise/trend-micro-apex-central-2019-widget-and-policy-
management-guide/officescan-agent-pol/application-control-_001/application-control/configuring-
applicat.aspx
Public Document
Assigningarule
1. On the Apex Central, log on to the Management
Console.
2. Go to Policies > Policy Management.
3. Create or Select the Policy Name created.
4. On targets select Manage Targets and select target
Apex One agents.
5. Go to Application Control Settings.
6. Assign Rule
7. Specify user or the group names
8. Select the criteria you want to assign. Click OK
CreatingaCriteria
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Resources.
3. Go to Application Control Criteria
4. Add a Criteria (Allow, Block, Import)
%AppData%\Local\Temp
This document is...
Advertisement
Public Document
Files\Content.OUTLOOK
• \Users\<user name>\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Content.IE5
• \Users\<user name>\AppData\Local\Temp
• \Documents\My Received Files
NOTE Use real “username” and “server name” or the wildcard “*” in <user name> and <file
server> to specify actual targets
NOTE The “Allow” rules is as important as the “Block” rule in the example rule-set above to make
sure that legitimate applications and existing programs of the endpoint can still utilize the folder
locations we specified in the blocking rule and avoid unexpected system behavior that could affect end-
users’ daily task.
Public Document
NOTE The manual hash values list can only support up to 20 entries. To manage larger lists, use
the import function.
This document is...
Advertisement
Public Document
NOTE
Performance Priority – Ensure protection against known Vulnerability Issues
Security Priority – Protect against known Vulnerability Issues and provide enhanced protection against suspicious
network activities
It is recommended to choose the Security Priority
Public Document
NOTE On certain scenarios, the default value prevents real-time scan from detecting
compressed files. You may opt to change the value for performance concerns.
Spyware/GraywareScanSettingsOnly
Uncheck “Enable assessment mode”
Enable “Scan for Cookies”
9. Go to Network tab >
EnhancedEncryptionofServer-AgentCommunication
“AES-256 encryption for communication between the Apex One server and Security agents:
Enabled”
NOTE This option is not available in SaaS version. To know more about the On-
Premise AES-256 encryption for communication
Try Scribd FREE for 30 days to access over 125 million titles without ads or
interruptions!
This document is...
Public Document
Public Document
Agent Self-protection
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Select the Product: Apex One (Mac)
4. Create or select the policy created.
5. On targets select Manage Targets and select target Apex One (Mac) agent/s.
6. Under Apex One (Mac) Settings select Agent Self-Protection
Select > Protect files used by the agent
This document is...
Advertisement
Public Document
NOTE Endpoint Sensor feature requires special licensing. Make sure that you have the
correct license before deploying Endpoint Sensor policies to endpoints. Contact your support
provider for more information.
Public Document
This document is...
Advertisement
Public Document
8. Target Tab > Schedule > Weekly, (depending on preferred day and time)
a. You may schedule the machines per group
9. File to Scan: All scannable files
10. Under Scan Settings >Enabled the following:
a. Scan compressed files
b. Scan Time Machine
11. CPU Usage:
a. Set to “Low: pause longer between file scans ”
12. Action Tab > Under Action
a. Use the same action for all security risk types
b. Select 1st Action: Clean | 2 nd Action: Quarantine
✓ ✓ ✓
Scan compressed files
Scan network drive ✓* ✓
c
All Types
1st Action : Clean ✓ ✓ ✓
2ndst Action : Quarantine ✓ ✓ ✓
Public Document
This document is...
Advertisement
Public Document
Public Document
This document is...
Advertisement
Public Document
NOTE You may opt to customize the scan action based on risk level.
• File: Quarantine
• File Sha-1: Block
• IP address: Block
• URL: Block
• Domain: Block
NOTE You can block IP, Domain, URL, File and File SHA-1 User-Defined Suspicious
Object (UDSO). However, not all products sync and take action against all UDSO. For
example, Apex One can only sync and take action against IP, Domain, URL, File but not
File SHA-1. See Reference here.
Public Document
You may check the Best Practice guideline using this feature here (page.76).
NOTE This feature requires Apex One Endpoint Sensor. Make sure that you have the
correct license. Contact your support provider for more information.
This document is...
Advertisement
Public Document
Prevention Recommendation
Windows Platform
Disabling System Restore
On Windows operating systems, System Restore is a feature that restores your computer to a point where it is
working fine. System Restore uses the last restore point made as its reference.
1. In Active Directory Users and Computers, navigate to Computer Configuration, Administrative
Templates | System | System Restore.
2. Double-click Turn off System Restore, set it to Enabled. Click OK .
3. Close the policy and exit Active Directory Users and Computers.
4. The changes will take effect on the next policy refresh.
To disable System restore manually on a system, you may refer here:
Disabling Autorun
The AutoRun technology is a Windows® feature Microsoft introduced in Windows 95. It allows Windows
Explorer to automatically launch programs from inserted storage drives and other media. Its command is
rooted into the applications and can’t be edited by users.
The AUTORUN.INF text file, used for both the AutoRun and AutoPlay features, is placed in the root
directory of a volume or storage drive to launch specific applications, such as installation of files.
Cybercriminals abuse this technology by using worms that propagate through physical, removable, and
network drives and by leaving a file named AUTORUN.INF. This file is used to automatically execute
malware each time the infected drive is accessed.
The AutoPlay feature was updated in Windows 7 to address this issue by removing the ability to automatically
launch programs from non-optical media such as USB drives.
To disable Autorun:
1. Click Start then Run.
2. Type “GPEDIT.MSC” then press Enter.
3. Go to Local Computer Policy | Administrative Template | System .
4. On the right pane, double-click Turn off Autoplay.
5. When you are in the properties dialog box, click enabled.
6. Choose All drives from the drop-down list.
7. Click OK .
Public Document
References:
https://support.microsoft.com/en-us/help/967715/how-to-disable-the-autorun-functionality-in-
windows
https://technet.microsoft.com/en-us/library/cc731387(WS.10).aspx
https://support.microsoft.com/en-ph/kb/967715
Leverage Windows Server Update Services (WSUS) to distribute updates, keeping windows up-to-date. You
may refer to the below article.
https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-
started/windows-server-update-services-wsus
MacOS Platform
Others
Educate users not to click on the links they do not trust
Do not open suspicious links or files especially from instant messengers, emails from unidentified users and
from pop-up windows.
You can utilize Trend Micro Phish Insight: https://phishinsight.trendmicro.com/en/
sc_ns2010_a
Afiq Masril
Magazines Podcasts
Sheet music
A Stochastic Model of
Multivirus Dynamics
JAYAPRAKASH
bac T1 T2 2008
alioundiaye
aaaaaaaaaaaaaaaaaaa.pptx
sanket
This document is...
Malware Computer Virus
malware
api-316835924
Detecting malware
using process tree and
process activity data
Nicolae Berendea
SINUMERIK_808D_ADVANCED_Parameter_Manual_02201
Klas Jonsson
Root cose This document is...
Ravi
Show more
Gifts
Language: English
This document is...