Trend Micro Apex One™ Security Agent Online Help
Contents
Index
Search
Collapse All
Expand All
Previous Page
Next Page
About
Trend Micro Apex One Security Agent
What's New in Trend Micro Apex One
Understanding Threats
Viruses and Malware
Spyware and Grayware
Intrusions
Malicious Behavior
Explicit/Restricted Content in Instant Messaging (IM) Applications
Web Threats
Uncleanable Files
Security Agent Settings (Full)
Key Features and Benefits
ActiveAction
Hot Fix
IntelliScan
IntelliTrap
True File Type
Malware Behavior Blocking
Security Risk Outbreaks
General Tasks
Working with the Main Console
Opening the Main Console
Main Console Elements
Accessing Task Shortcuts
Checking the Security Agent Status
Security Agent Icons (Full)
Conventional Scan Icons
Smart Scan Icons
Accessing the Console Flyover (Full)
Running a Manual Update (Full)
Viewing Component Information (Full)
Running a Manual Scan
Viewing Scan Results
Typical Scan Results
Scan Results that May Require Attention
Manually Restoring Encrypted Files
Malware Behavior Blocking Scan Results
Threat Details
Viewing Logs
Using Data Loss Prevention and File Encryption
Using the Unlock Feature
Customizable Settings
Configuring Real-time Scan
Real-time Scan: Scan Targets
Real-time Scan: Scan Actions
Real-time Scan: Exclusions
Real-time Scan: Advanced Settings
Configuring Manual Scan
Manual Scan: Scan Targets
Manual Scan: Scan Actions
Manual Scan: Exclusions
Manual Scan: Advanced Settings
Configuring Scheduled Scan
Scheduled Scan: Frequency
Scheduled Scan: Scan Targets
Scheduled Scan: Scan Actions
Scheduled Scan: Exclusions
Scheduled Scan: Advanced Settings
Configuring Behavior Monitoring Settings
Configuring the Firewall
Intrusion Detection System
Configuring Mail Scan
Configuring Device Control
Configuring the Trusted Program List
Configuring Proxy Settings
Configuring Log Maintenance
Security Agent Settings (Coexist)
Features and Benefits (Coexist)
General Tasks (Coexist)
Opening the Main Console (Coexist)
Main Console Elements (Coexist)
Accessing Task Shortcuts (Coexist)
Checking the Security Agent Status (Coexist)
Security Agent Icons (Coexist)
Accessing the Console Flyover (Coexist)
Running a Manual Update (Coexist)
Viewing Component Information (Coexist)
Viewing Logs (Coexist)
Customizable Settings (Coexist)
Configuring Proxy Settings
Configuring Log Maintenance
Getting Help
The Trend Micro Knowledge Base
Documentation Feedback
ActiveAction
[1]
ActiveX malicious code
[1]
boot sector virus
[1]
COM file infector
[1]
components
[1]
[2]
Conflicted ARP
[1]
contacting
[1]
Knowledge Base
[1]
Trend Micro
[1]
Damage Cleanup Services
[1]
Device Control
[1]
documentation feedback
[1]
EICAR test script
[1]
EXE file infector
[1]
Fragmented IGMP
[1]
HTML virus
[1]
IDS
[1]
Intrusion Detection System
[1]
Java malicious code
[1]
JavaScript virus
[1]
joke program
[1]
Knowledge Base
[1]
LAND Attack
[1]
macro virus
[1]
network virus
[1]
Overlapping Fragment
[1]
packer
[1]
Ping of Death
[1]
Plug-in Manager
[1]
probable virus/malware
[1]
programs
[1]
[2]
ransomware
[1]
rootkit
[1]
Security Agent
connection
[1]
connection with Apex One server
[1]
icons
[1]
key features and benefits
[1]
[2]
security risks
[1]
[2]
[3]
[4]
[5]
[6]
[7]
protection from
[1]
spyware/grayware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
spyware/grayware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
adware
[1]
dialers
[1]
hacking tools
[1]
joke programs
[1]
password cracking applications
[1]
remote access tools
[1]
spyware
[1]
SYN Flood
[1]
Teardrop
[1]
test virus
[1]
Threat Encyclopedia
[1]
Tiny Fragment Attack
[1]
Too Big Fragment
[1]
Trend Micro
Knowledge Base
[1]
Trojan horse program
[1]
[2]
VBScript virus
[1]
virus/malware
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
ActiveX malicious code
[1]
boot sector virus
[1]
COM and EXE file infector
[1]
Java malicious code
[1]
joke program
[1]
macro virus
[1]
packer
[1]
probable virus/malware
[1]
ransomware
[1]
rootkit
[1]
test virus
[1]
Trojan horse program
[1]
types
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
VBScript, JavaScript or HTML virus
[1]
worm
[1]
Web Reputation
[1]
[2]
worm
[1]
Search
Toggle search result highlighting
Intrusions
Intrusions refer to entry into networks or
endpoints
either by force or without permission. It could also mean bypassing the security of a network or
endpoint
.