Trend Micro, Inc.
October 2019
Trend Micro Apex One™ as a Service
Version 2019
This readme file is current as of the date above. However, all customers are advised to check Trend Micro's website for documentation updates at http://docs.trendmicro.com/en-us/enterprise/apex-one-as-a-service.aspx.
Register online with Trend Micro within 30 days of installation to continue downloading new pattern files and product updates from the Trend Micro website. Register during installation, or online at http://olr.trendmicro.com.
Trend Micro always seeks to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://docs.trendmicro.com/en-us/survey.aspx.
1. About Apex One as a Service
Trend Micro Apex One™ as a Service protects endpoints, on or off the corporate network, against malware, Trojans, worms, spyware, and ransomware with protection that adapts against new unknown variants as they emerge.
Apex One as a Service provides the following full-featured product benefits:
More efficient use of endpoint resources
Delivered via an architecture that uses endpoint resources more effectively and optimizes CPU and network utilization
High-fidelity machine learning (pre-execution and runtime)
A blend of threat protection techniques that help eliminate security gaps across any user activity and any endpoint
Behavioral analysis
Safeguards against scripts, injection, ransomware, memory and browser attacks
Available as a service
Rapid deployment and simplified administration and maintenance with the same comprehensive enterprise threat protection as the on-premises Trend Micro Apex One
For more information, go to:
http://docs.trendmicro.com/en-us/enterprise/apex-one-as-a-service.aspx
This release of Apex One as a Service includes the following new features and enhancements:
Always available Root Cause Analysis
Security Agents continuously upload activity data to Trend Micro so you can generate up-to-date RCA chains regardless of endpoint status.
Automated troubleshooting
If you grant the necessary permissions, Trend Micro engineers can take proactive, preventative measures to ensure the continuity of your business operations without interrupting you with numerous email messages and notifications.
Dashboard enhancements
The name of the Operation Center tab has changed to Security Posture, the name of the Threat Detection tab has changed to Threat Statistics, and the widgets on the former DLP Incident Investigation tab have moved to the Data Loss Prevention tab.
Enhanced platform support
Apex One as a Service extends sensor capabilities for investigations to managed servers running on a supported Linux operating system.
Fileless attack protection enhancement
Integration with the Windows Antimalware Scan Interface (AMSI) enhances protection against malicious scripts.
Historical Investigation support
You can specify specific URLs to search for while performing a Historical Investigation.
Impact Analysis enhancement
The Affected Users screen automatically refreshes every 60 seconds when running an Impact Analysis.
Performance enhancements
You can configure Application Control to limit the number of logs that each Security Agent uploads each hour.
Root Cause Analysis enhancement
Apex One as a Service supports Root Cause Analysis in Historical Investigations on Apex One (Mac) endpoints.
Threat Investigation dashboard
Tailor-made for security analysts performing EDR, the tab allows you to start Historical Investigations, view Attack Discovery detections, and identify critical threats.
Web Console Auto Refresh enhancement
You can configure the Apex Central management console to automatically refresh the screen every 600 seconds (enabled by default).
Previous releases included the following features:
Correlation Events
Cloud App Security integration allows you to investigate protected mailboxes, correlate user information, and generate Analysis Chains in Apex Central to understand threat vectors.
New system notices
The bell icon in the top right corner of the Apex Central management console provides information about new system updates, including when Apex One as a Service will be offline for scheduled maintenance.
Syslog forwarding
The Syslog Settings screen allows you to configure Apex Central as a Service to automatically forward supported log types to a syslog server.
Enhanced Attack Discovery log information
Attack Discovery logs include MITRE™ Tactics and Techniques information and Windows Antimalware Scan Interface (AMSI) data.
Direct access to third-party intelligence
Links to the third-party intelligence sites Threat Connect and VirusTotal on the Preliminary Investigation, Root Cause Analysis, and Detailed Investigation screens.
Important: As of October 2019, the name of the Preliminary Investigation screen has changed to Historical Investigation and the name of the Detailed Investigation screen has changed to Live Investigation.
Faster metadata collection
Security Agents with Endpoint Sensor enabled upload data to the server every 15 minutes to ensure that Preliminary Investigations return up-to-date results.
Enhanced Root Cause Analysis reports
Root Cause Analysis reports provide a clear indication of objects with invalid signatures and display further explanation for detected Suspicious Objects.
Preliminary Investigation enhancements
File queries enhanced to support SHA-256 and MD5 values.
Important: As of October 2019, the name of the Preliminary Investigation screen has changed to Historical Investigation.
Enhanced platform support
Trend Micro Apex One Security Agents with or without the Endpoint Sensor feature enabled support the Windows 10 May 2019 (1903/19H1) release.
Detailed Investigation searches
You can search for specific One-Time or Scheduled Investigation tasks using task name, criteria, method, or creator.
Important: As of October 2019, the name of the Detailed Investigation screen has changed to Live Investigation.
Single, integrated Security Agent
The upgraded Security Agent has combined all the integrated product agents to provide your complete security requirements in a single agent program.
Endpoint Sensor integration
Integration with Endpoint Sensor allows you to monitor, record, and perform both current and historical security investigations on your Apex One endpoints. Use the Apex Central console and perform preliminary investigations to locate at-risk endpoints before executing an in-depth Root Cause Analysis to identify the attack vectors.
Application Control integration
Integration with Application Control provides Apex One users with advanced application blocking and endpoint lockdown capabilities. You can run application inventories and create policy rules that only allow specific applications to execute on your endpoints. You can also create application control rules based on application category, vendor, or version.
Vulnerability Protection integration
Integration with Vulnerability Protection protects Apex One users by automating the application of virtual patches before official patches become available. Trend Micro provides protected endpoints with recommended Intrusion Prevention rules based on your network performance and security priorities.
Offline Predictive Machine Learning
Predictive Machine Learning has been upgraded to provide offline protection against portable executable files. The lightweight, offline model helps protect all endpoints against unknown threats when a functional Internet connection is unavailable.
Fileless attack protection
Security Agent policies provide increased real-time protection against the latest fileless attack methods through enhanced memory scanning for suspicious process behaviors. Security Agents can terminate suspicious processes before any damage can be done.
Apex One Sandbox as a Service integration
Subscription to the cloud Virtual Analyzer allows you to perform sample submission, synchronize suspicious object lists, and take action on user-defined suspicious objects.
Customized threat intelligence
Apex Central allows you to customize your threat intelligence capabilities by manually adding suspicious objects, uploading OpenIOC and STIX files from trusted sources, or automating investigations with the new Apex Central APIs.
Managed Detection and Response
The Managed Detection and Response Service brings together the power of the Trend Micro Threat Investigation Center and industry-leading user protection solutions to further protect your network. Improve your threat detection, incident response, and continuous monitoring capabilities, even with limited resources on hand.
For information regarding hotfix solutions and the enhancements available in this release of Apex One as a Service, go to:
The document set includes:
Apex One as a Service Documents
Apex Central as a Service Documents
Apex One Server Documents
Apex One (Mac) Server Documents
Security Agent Documents
Download the latest versions of the PDF documents and readme at http://docs.trendmicro.com/en-us/enterprise/apex-one-as-a-service.aspx.
Apex One as a Service supports the following web browsers:
The Apex One Security Agent can be installed on endpoints running Microsoft Windows platforms. The Security Agent is also compatible with various third-party products.
Visit the following website for a complete list of system requirements and compatible third-party products:
http://docs.trendmicro.com/en-us/enterprise/apex-central-saas/Downloading-Security
Size of Deployment Package
Note: All of the following deployment package sizes are for packages that do not include the Data Protection feature.
For the fully-functional Security Agent MSI Setup Package:
For the coexist Security Agent MSI Setup Package:
The Apex One (Mac) Security Agent can be install on endpoints running supported Mac platforms.
Visit the following website for a complete list of system requirements:
http://docs.trendmicro.com/en-us/enterprise/apex-central-saas/Downloading-Security
Size of Deployment Package
For the Apex One (Mac) Security Agent ZIP Setup Package: 113.4 MB
The Apex One (Linux) Security Agent can be install on endpoints running supported Linux platforms.
Visit the following website for a complete list of system requirements:
http://docs.trendmicro.com/en-us/enterprise/apex-central-saas/Downloading-Security
For Security Agent installation instructions, refer to the following website:
http://docs.trendmicro.com/en-us/enterprise/apex-central-saas/Downloading-Security
The following are the known issues related to the Apex Central management console in this release:
If Apex Central is unable to synchronize Active Directory group information from the Active Directory server, manually add the Active Directory user accounts.
The Active Directory agent synchronization tool does not support IPv6 proxy servers.
If you click Export incident details on the Incident Information screen for the DLP Incidents by Severity and Status widget and then change the number of rows that display per page, no data displays on the DLP Incidents by User widget or the DLP Incident Trends by User widget.
After isolating an endpoint using the Apex Central web console, the Security Agent program can no longer connect to the Apex One server if a proxy server is required.
To resolve this issue, add the required proxy server to the Allowed Traffic exceptions before isolating the endpoint.
The file name of the attached ZIP file for a generated report does not display properly if the report name contains non-alphanumeric characters.
The attached ZIP file for a generated report cannot be opened if the report name contains Traditional Chinese characters.
When clicking a number on the Policy Management screen, the Apex Central console may log out if the Data Loss Prevention policy is not deployed successfully.
When specifying targets by searching for operating systems, or filtering policies by operating system, Windows Server 2019 is not available.
Apex Central Policy Tracking displays commands to older versions of the OfficeScan agent as "Pending" regardless of the actual command status.
To resolve this issue, upgrade all older versions of the OfficeScan agent program to the Trend Micro Apex One Security Agent.
If this version of Apex Central is configured as the hub server for a node server running a previous version of Control Manager, the Control Manager node server cannot send Suspicious Object lists to the Apex Central hub server.
If the web session times out when navigating to another screen, the web console does not automatically redirect to the Log On screen.
To resolve this issue, refresh the web browser to load the Log On screen and log on to the web console again.
Apex One and Security Agent Known Issues
The following are the known issues related to the Apex One server and Security Agents in this release:
Agent Installation and Upgrade
You are unable to migrate OfficeScan XG SP1 agents to the Apex One server successfully if the agents used the GlobalSettings.ini "ASE=0" setting to force an HTTP connection with the previous OfficeScan server.
To resolve this issue, modify the GlobalSettings.ini ASE value to "1" and deploy to all agents on the OfficeScan XG SP1 server before migrating agents to the Apex One server.
The Common Client Solution Framework service may not start if “Microsoft Visual C++ 2017 Redistributable” was not installed successfully.
To resolve this issue, ensure that you install the following Windows update to properly install Microsoft Visual C++ 2017 Redistributable:
https://support.microsoft.com/en-us/help/2999226/update-for-universal-c-runtime-in-windows
Security Agent consoles running build 13.95 display an incorrect policy name.
To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Security Agents must connect directly to the Apex One server to receive the Certified Safe Software Pattern updates.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue.
To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
You can attempt to run an assessment using more criteria, such as cmd line or file name, to obtain matched details about the file path.
Long running processes may generate a lot of similar event data on Windows endpoints, such as "svchost.exe" events, which may cause assessments to be unable to fully process and correlate process chains.
The quality of analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
Use another image viewer to resolve this issue.
Security Agents do not update the Certified Safe Software Pattern if no other components have updates available.
To resolve this issue, perform a manual update by clicking Update Now from the Security Agent console.
When matching applications using a certificate rule, Application Control can only perform property and attribute matching on the first digital signature listed on the certificate.
When the security level on a Citrix server is medium or high, perform the following steps:
If you enable the option Check HTTPS URLs in a Web Reputation policy, select the option Enable third-party browser extensions in Internet Explorer. If this option is disabled, agents will not be able to check the reputation of HTTPS websites.
Agents can browse blocked sites if using Juniper Networks VPN and proxy servers to connect to the Internet. To resolve this issue:
Cloud Synchronization Channel Support
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a backslash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.
Apex Central administrators cannot filter Apex One (Linux) Security Agent endpoints in the User/Endpoint Directory by IP address if DHCP is enabled on the Apex One (Linux) Security Agent endpoint.
You can use other criteria to filter or select Apex One (Linux) Security Agents in the User/Endpoint Directory.
A license to the Trend Micro software usually includes the right to product updates, pattern file updates, and basic technical support for one (1) year from the date of purchase only. After the first year, Maintenance must be renewed on an annual basis at Trend Micro's then-current Maintenance fees.
Contact Trend Micro via fax, phone, and email, or visit our website to download evaluation copies of Trend Micro products.
http://www.trendmicro.com/us/about-us/contact/index.html
Note: This information is subject to change without notice.
Smart, simple, security that fits
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information
Copyright 2019, Trend Micro Incorporated. All rights reserved.
Trend Micro, Trend Micro Apex One, Trend Micro Apex Central, and the t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies.
View information about your license agreement with Trend Micro at:
http://www.trendmicro.com/us/about-us/legal-policies/license-agreements
Third-party licensing agreements can be viewed: