Category

OfficeScan Training for Certified Professionals

This course provides information about the basic architecture, protection functionality, deployment scenarios, and troubleshooting.

Overview

In this course, you will learn how to use Trend Micro™ OfficeScan. This course provides information about the basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice installing and configuring various OfficeScan protection features, and administration options needed for a successful implementation and long-term maintenance.

Prerequisites

Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles. Participants should also have a working knowledge of the following products:
  • Windows servers and clients
  • Microsoft Internet Information Server (IIS)
  • General understanding of malware

Who Should Attend?

This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.

System administrators, Network engineers, Support engineers, Integration engineers, Solution and Security Architects

Course Outline

  • New Features and Enhancements in OfficeScan XG
    • Architecture Overview (OfficeScan Server and Agents)
  • Key Features and Benefits
  • Footprint
    • Services and Major Components
    • Configuration Repository and Database
  • OfficeScan Server and Agent Installations
  • Upgrade Options
  • Server Migration
  • Agent Installation Methods, Uninstalls and Post-Installation Tasks
  • Ports and Protocols
  • Authentication
  • Management Console
  • Users, Roles and Grouping
  • Smart Protection Network and Smart Protection Servers
  • Virus Protection
  • File Reputation
  • Spyware/Grayware Protection
  • Firewall Protection
  • Web Threat Protection
  • Agent/Server Communications
  • Troubleshooting
  • Authentication
  • Ports and Protocols
  • Console Access and Roles
  • Unmanaged Endpoints
  • Agent Grouping and Settings
  • Offline Agents
  • OfficeScan Edge Relay for Off Premise Protection
  • Server and Agent Updates
  • Update Methods and Sources
  • Downloading and Deploying
  • Rollbacks
  • Smart Protection Network and Servers
  • Virus Protection
  • File Reputation
  • Advanced Threat Scan Engine (ATSE) Scan
  • Spyware/Grayware Protection
  • Damage Clean-up
  • Firewall
  • Web threat Protection
  • Behavior Monitoring (including Unauthorized Change Prevention)
  • Census (Behavior Monitoring)
  • Ransomware Protection
  • Memory Scanning and Browser Exploit Solution
  • Suspicious Connection Services
  • Predictive Machine Learning
  • Architecture and Installation
  • DLP Agent
  • Device and Digital Asset Control
  • DLP Logging and Debugging
  • Trend Micro Control Manager DLP Management for OfficeScan
  • Threat Response Flow
  • Registering Trend Micro Control Manager to OfficeScan
  • Configuring Suspicious Objects
  • Agent Sample Submission to Deep Discovery Analyzer (DDA)
  • Suspicious Object Logs
  • Debugging OfficeScan Server and Agents
  • Determining Virus Detections (Infection Channel)
  • Enabling SSAPI Logs
  • Debugging Common Issues
    • Firewall
    • Integrating Web Reputation Service
    • Unauthorized Change Prevention Service
    • Web Reputation Service
    • OfficeScan Edge Server
    • Certificates
    • Sample Submission and suspicious Objects
  • Smart Protection Server Best Practices

Get Pricing and Brochure

More Like This

Get the course Brochure & Pricing

Our course consultant will contact you within 1 working day

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Get in touch with our consultant