Overview
In this course, you will learn how to use Trend Microâ„¢ OfficeScan. This course provides information about the basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice installing and configuring various OfficeScan protection features, and administration options needed for a successful implementation and long-term maintenance.
Prerequisites
Before you take this course, Trend Micro recommends that you have a working knowledge of their products and services, as well as basic networking concepts and principles.
Participants should also have a working knowledge of the following products:
- Windows servers and clients
- Microsoft Internet Information Server (IIS)
- General understanding of malware
Who Should Attend?
This course is designed for IT professionals who are responsible for protecting networks from any kind of networked, endpoint, or cloud security threats.
System administrators, Network engineers, Support engineers, Integration engineers, Solution and Security Architects
Course Outline
- New Features and Enhancements in OfficeScan XG
- Architecture Overview (OfficeScan Server and Agents)
- Key Features and Benefits
- Footprint
- Services and Major Components
- Configuration Repository and Database
- OfficeScan Server and Agent Installations
- Upgrade Options
- Server Migration
- Agent Installation Methods, Uninstalls and Post-Installation Tasks
- Ports and Protocols
- Authentication
- Management Console
- Users, Roles and Grouping
- Smart Protection Network and Smart Protection Servers
- Virus Protection
- File Reputation
- Spyware/Grayware Protection
- Firewall Protection
- Web Threat Protection
- Agent/Server Communications
- Troubleshooting
- Authentication
- Ports and Protocols
- Console Access and Roles
- Unmanaged Endpoints
- Agent Grouping and Settings
- Offline Agents
- OfficeScan Edge Relay for Off Premise Protection
- Server and Agent Updates
- Update Methods and Sources
- Downloading and Deploying
- Rollbacks
- Smart Protection Network and Servers
- Virus Protection
- File Reputation
- Advanced Threat Scan Engine (ATSE) Scan
- Spyware/Grayware Protection
- Damage Clean-up
- Firewall
- Web threat Protection
- Behavior Monitoring (including Unauthorized Change Prevention)
- Census (Behavior Monitoring)
- Ransomware Protection
- Memory Scanning and Browser Exploit Solution
- Suspicious Connection Services
- Predictive Machine Learning
- Architecture and Installation
- DLP Agent
- Device and Digital Asset Control
- DLP Logging and Debugging
- Trend Micro Control Manager DLP Management for OfficeScan
- Threat Response Flow
- Registering Trend Micro Control Manager to OfficeScan
- Configuring Suspicious Objects
- Agent Sample Submission to Deep Discovery Analyzer (DDA)
- Suspicious Object Logs
- Debugging OfficeScan Server and Agents
- Determining Virus Detections (Infection Channel)
- Enabling SSAPI Logs
- Debugging Common Issues
- Firewall
- Integrating Web Reputation Service
- Unauthorized Change Prevention Service
- Web Reputation Service
- OfficeScan Edge Server
- Certificates
- Sample Submission and suspicious Objects
- Smart Protection Server Best Practices