Apex One Best Practices Guide For Malware Protection (1) - 20191021
Apex One Best Practices Guide For Malware Protection (1) - 20191021
No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the
express prior written consent of Trend Micro Incorporated.
All other brand and product names are trademarks or registered trademarks of their respective companies or
organizations.
1 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Table of Contents
TrendMicro Apex One™ as a Service / Apex One™ Best Practice Guide for Malware Protection .................. 4
Global Policy Management ............................................................................................................................................... 5
Configuring Scan Method ............................................................................................................................................. 5
Configuring Manual Scan Settings ............................................................................................................................... 5
Configuring Real-time Scan Settings ........................................................................................................................... 6
Configuring Scheduled Scan Settings .......................................................................................................................... 7
Configuring Scan Now Settings ................................................................................................................................... 8
Table Summary ............................................................................................................................................................... 9
Enable Web Reputation ................................................................................................................................................ 9
Internal Agents: .......................................................................................................................................................... 9
External Agents:....................................................................................................................................................... 10
Configure Global C&C Suspicious Connection Settings ....................................................................................... 10
Enable Smart Feedback ............................................................................................................................................... 11
Enable Behavior Monitoring / Ransomware Protection Feature ........................................................................ 12
Malware behavior blocking .................................................................................................................................... 13
Ransomware Protection.......................................................................................................................................... 13
Anti-Exploit Protection ....................................................................................................................................... 14
Newly Encountered Programs .............................................................................................................................. 14
Event Monitoring .................................................................................................................................................... 14
Enable Predictive Machine Learning ........................................................................................................................ 15
Fileless Malware Protection settings.......................................................................................................................... 16
Required Services ..................................................................................................................................................... 17
Enable File-less Malware Solution Features: ....................................................................................................... 17
Enable Sample Submission Feature .......................................................................................................................... 18
Configure Global Agent Settings ............................................................................................................................... 18
Configure Apex One Agent self-protection............................................................................................................. 19
Configure Device Control........................................................................................................................................... 20
Permissions for Storage devices ............................................................................................................................ 20
Disabling Independent Mode for Machine in the network ................................................................................... 21
Enabling Endpoint Sensor.......................................................................................................................................... 21
Enabling Application Control Integration ............................................................................................................... 22
Enabling Vulnerability Protection Settings .............................................................................................................. 24
Frequently Asked Questions (FAQs) about Apex One Vulnerability Protection......................................... 24
2 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
TrendMicro Apex One™ (Mac) for Malware Protection .......................................................................................... 25
Agent Self-protection................................................................................................................................................... 25
Cache Settings for Scans ............................................................................................................................................. 25
Configuring Device Control Settings ........................................................................................................................ 25
Configuring Endpoint Sensor Settings ..................................................................................................................... 26
Configuring Manual Scan Settings ............................................................................................................................. 26
Configuring Predictive Machine Learning Setting .................................................................................................. 26
Configuring Real Time Scan Settings ........................................................................................................................ 27
Configuring Scan Method ........................................................................................................................................... 27
Configuring Schedule Scan Settings .......................................................................................................................... 27
Scan Settings Table Summary..................................................................................................................................... 28
Configuring Web Reputation Settings ...................................................................................................................... 28
Prevention Recommendation ......................................................................................................................................... 29
Windows Platform ....................................................................................................................................................... 29
Disabling System Restore ....................................................................................................................................... 29
Disabling Autorun ................................................................................................................................................... 29
Run Microsoft Baseline Security Analyzer........................................................................................................... 30
MacOS Platform ........................................................................................................................................................... 30
Keeping your Mac up to Date ............................................................................................................................... 30
Don’t Disable System Integrity Protection.......................................................................................................... 30
Others............................................................................................................................................................................. 30
Educate users not to click on the links they do not trust .................................................................................. 30
3 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
TrendMicro Apex One as a Service / Apex
One Best Practice Guide for Malware
Protection
Trend Micro Apex One™ as a Service / Apex One protects endpoints, on or off the corporate network,
against malware, Trojans, worms, spyware, and ransomware, with protection that adapts against new
unknown variants as they emerge.
Behavioral analysis
Safeguards against scripts, injection, ransomware, memory and browser attacks.
Available as a service
Rapid deployment and simplified administration and maintenance with the same comprehensive
enterprise threat protection as Trend Micro on-premises Apex One
4 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Global Policy Management
System administrators can use policies to configure and deploy product settings to managed products and
endpoints from a single management console, to ensure consistent enforcement of your organization's
virus/malware and content security policies.
Policy management allows administrators to enforce product settings on managed products and endpoints
from a single management console. They create a policy by selecting the targets and configuring a list of
product settings.
To perform policy management on a new managed product or endpoint, move the managed product from
the New Entity folder to another folder in the Product Directory structure.
Please refer to this guide on Policy Management and Deployment.
5 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Trojans: Quarantine
Virus: Clean & Quarantine
Test Virus: Quarantine
Packer: Quarantine
Probable Malware: Quarantine
Other Malware: Clean & Quarantine
13. Back up files before cleaning.
14. Damage Cleanup Services:
Cleanup type: Advanced cleanup
Enable > Run cleanup when probable virus/malware is detected
15. Spyware/Grayware > Clean: Apex One terminates processes or delete registries, files, cookies and
shortcuts.
16. Click Deploy.
6 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Packer: Quarantine
Probable Malware: Quarantine
Other Malware: Clean & Quarantine
17. Back up files before cleaning.
18. Damage Cleanup Services:
Enable > Run cleanup when probable virus/malware is detected
19. Spyware/Grayware > Clean: Apex One terminates processes or delete registries, files, cookies and
shortcuts.
20. Click Deploy.
7 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Configuring Scan Now Settings
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Create or Select the Policy Name created.
4. On targets select Manage Targets and select target Apex One agents.
5. Enable virus/malware scan and enable spyware/grayware scan.
6. Configure the Target tab.
7. Files to Scan > All Scannable files
8. Scan Settings:
Scan compressed files.
Scan OLE objects.
9. Virus/Malware Scan Settings only > Scan boot area
10. CPU Usage > Medium: Pause between file scans if CPU consumption is higher than 50%, and do
not pause if 50% or lower
11. Scan Exclusion > Enable Scan exclusion
Scan Exclusions lists (Directories)
o Excludes directories where Trend Micro products are installed
Scan Exclusions Lists (Files)
Scan Exclusions Lists (File Extensions)
12. Configure the Action tab.
13. Virus/Malware > Use a specific action for each virus/malware type
Joke: Quarantine
Trojan: Quarantine
Virus: Clean & Quarantine
Test Virus: Quarantine
Packer: Quarantine
Probable Malware: Quarantine
Other Malware: Clean & Quarantine
16. Enable Spyware/Grayware > Clean: Apex One terminates processes or delete registries, files,
cookies and shortcuts.
17. Click Deploy.
8 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Table Summary
Real-time Scan Manual Scan Scheduled Scan Scan Now
Files to scan All Scannable All Scannable All Scannable All Scannable
Cleanup type for Damage Cleanup Services Advanced Cleanup Advanced Cleanup Advanced Cleanup
Run cleanup for probable virus
Internal Agents:
9 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Enable Check HTTPS URLs.
Select Medium security level for the policy.
Under Browser Exploit Prevention, enable Block pages containing malicious script.
o For Approved/Blocked URL list, You may add the URL’s of the Web sites you want to
approve or block. By default, TrendMicro and Microsoft websites are included in the
Approved lists.
Select whether to allow agents to send logs to Apex One Server. You can use this option to
analyze URL’s blocked by Web Reputation Service.
Click Deploy
External Agents:
Enable Check HTTPS URLs.
Select Medium security level for the policy.
Untested URLs. You can use this option to Block pages that have not been tested by Trend
Micro
Under Browser Exploit Prevention, enable Block pages containing malicious script.
o For Approved/Blocked URL list, You may add the URL’s of the Web sites you want to
approve or block. By default, TrendMicro and Microsoft websites are included in the
Approved lists.
Select whether to allow agents to send logs to Apex One Server. You can use this option to
analyze URL’s blocked by Web Reputation Service.
Click Deploy.
10 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Clean suspicious connections when C&C callback is detected
9. Click Deploy.
11 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Enable Behavior Monitoring / Ransomware
Protection Feature
Apex One constantly monitors computers (or endpoints) for unusual modifications to the operating system
or on installed software. Administrators can create exception lists that allow certain programs to start despite
violating a monitored change, or completely block certain programs. In addition, programs with a valid
digital signature or have been certified are always allowed to start.
NOTE On Windows Server platform, the “Only enable services required by Security
Agent Self-protection features” ONLY enables the Agent Self-protection. Other Features will be
not available
12 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
To configure Behavior Monitoring and Ransomware Protection features, please do the following:
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Create or Select the Policy Name created.
4. On targets select Manage Targets and select target Apex One agents.
5. Go to Behavior Monitoring Settings.
Ransomware Protection
Ransomware is a type of malware which restricts access to files and demands payment to restore the
affected files. This type of threat can affect multiple files residing on your local and connected drives,
it can also affect backups such as shadow copies. Ransomware Protection prevents the unauthorized
modification or encryption of files on Apex One agents by “ransomware” threats.
NOTE To reduce the chance of Apex One detecting a safe process as malicious, ensure
that the agent has internet access to perform additional verification processes using Trend Micro
servers.
Check Enable program inspection to detect and block compromised executable files.
13 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
NOTE Program inspection provides increased security if you select “Known and potential
threats” in the Threat to block drop-down
Anti-Exploit Protection
Anti-exploit protection works in conjunction with program inspection to monitor the behavior of
programs and detect abnormal behavior that may indicate that an attacker has exploited program
vulnerability. Once detected, Behavior Monitoring terminates the program processes.
Check Terminate programs that exhibit abnormal behavior associated with exploit
attacks.
NOTE Anti –exploit Protection requires that you select Enable program inspection to
detect and block compromised executable files
NOTE This notification requires that Administrators enable Real – time Scan and
web Reputation
Event Monitoring
Event Monitoring provides a more generic approach to protecting against unauthorized software and
malware attacks. It monitors system areas for certain events, allowing administrators to regulate
programs that trigger such events. Use Event Monitoring if you have specific system protection
requirements that are above and beyond what is provided by Malware Behavior Blocking.
14 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
6. Click Deploy.
NOTE Predictive Machine Learning attempts to clean the files that executed the
malicious processes. If the clean action is unsuccessful, Apex One quarantines the affected
files.
7. Under Exceptions, configure the global Predictive Machine Learning file exceptions to prevent all
agents from detecting a file as malicious.
8. Click Add file hash.
16 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Required Services
1. Go to Policies > Policy Management
2. Select the policy to which the settings will be applied
3. Go to Additional Service Settings
4. Enable the following:
NOTE Administrators can opt to enable the services and features to Windows
Server Platforms should higher security is required for those machines.
17 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Predictive Machine Learning
1. Go to Policies > Policy Management
2. Select the policy to which the settings will be applied
3. Expand Predictive Machine Learning Settings
4. Check Enable Predictive Machine Learning
5. Under Detection Settings
a. Check File for File Scanning and Select Quarantine For Action
b. Check Process for Process Scanning and Select Terminate for Action
18 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
To configure Global Agent Settings:
1. On the Apex Central page, go to Administrations > Managed Servers > Server Registration.
2. From the Server Type drop-down.
3. Select Apex One.
4. Click the Apex One server URL
5. The Apex One management console opens.
6. Go to Agents and select Global Agent Settings.
7. Go to Security Settings >
Scan Settings for Large Compressed Files.
Real-time Scan
Do not scan files if the compressed file size exceed: 10 MB
In a compressed file, scan only the first: 10 files
8. Go to System tab. Under Services Area, select Automatically restart any Security Agent service
if the service terminates unexpectedly.
9. Click Save.
19 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Protect Security Agent services
Protect files in the Security Agent installation folder
Protect Security Agent registry keys
Protect Security Agent processes
20 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
lists” which allows programs on storage devices to have Modify, Read and execute, Read and List
device content only.
Configure the list of approved USB storage devices. Device Control allows you to block access to all
USB storage devices, except those that have been added to the list of approved devices. You can
grant full access to the approved devices or limit the level of access
Configure the settings according to your preference.
NOTE Endpoint Sensor feature requires special licensing. Make sure that you have the
correct license before deploying Endpoint Sensor policies to endpoints. Contact your support
provider for more information.
21 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
7. Click Save to deploy.
Configure Application Control criteria that you can then assign to Security Agent policy rules. You can create
"Allow" and "Block" criteria to limit the applications that users can execute or install on protected endpoints.
You can also create assessment criteria to monitor the applications executing on endpoints and then refine
the criteria based on the usage results.
Each managed product provides different policy settings that you can configure and deploy to policy targets.
You can find a complete list of supported managed products and the policy settings for each in the Apex
Central as a Service Widget and Policy Management Guide.
You can download a PDF version of the guide using the following link:
http://docs.trendmicro.com/en-us/enterprise/apex-one-as-a-service.aspx
You can also view the guide online using the following link:
http://docs.trendmicro.com/en-us/enterprise/apex-central-as-a-service-online-help-1907/policies/policy-
management.aspx
The following table outlines the tasks available on the Application Control Criteria screen
Task Description
Add criteria Click the Add Criteria drop-down button and select from the following options:
22 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Allow: Click to define "Allow" or "Lockdown" criteria
For more information, see Defining Allowed Application Criteria.
Block: Click to define "Block" or "Assessment" criteria
For more information, see Defining Blocked Application Criteria.
Copy: Select an existing criteria and click Copy to define new criteria based on the existing
settings
Import: Click to select a ZIP package exported from a compatible Application Control source
Note:
If the imported package contains criteria names that match preexisting criteria, you have the
option to Overwrite existing criteria or Skip the import of the criteria with duplicated names.
Select the check box to the left of existing criteria and click Export to save the selected criteria to a
Export criteria
ZIP package (<timestamp>_iACRuleExport.zip)
Select the check box to the left of existing criteria and click Delete to remove the selected criteria
from the list
Warning:
Delete criteria
If you selected criteria used by existing Apex One Security Agent policies, you must confirm that
you want to delete and remove the criteria from all affected Security Agent policies. You cannot
undo this action.
Click a Criteria Name to modify the criteria settings
Modify criteria Note:
Affected endpoints receive modified criteria settings the next time the Security Agents connect to
the server.
Click the value in the Target Policies column to display a list of all Apex One Security Agent policies
that implement the criteria.
View policy
Tip:
associations
Click a policy name to open a new browser tab on which you can view or modify the policy
settings.
23 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
7. Click Save to deploy.
24 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
TrendMicro Apex One (Mac) for Malware
Protection
Trend Micro Apex One™ (Mac) provides the latest endpoint protection against security risks, blended
threats, and platform independent web-based attacks. The Apex One (Mac) server is a plug-in program
integrated with Trend Micro products such as Apex One and Worry-free Business Security and installed
through the Plug-in Manager framework.
Agent Self-protection
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Select the Product: Apex One (Mac)
4. Create or select the policy created.
5. On targets select Manage Targets and select target Apex One (Mac) agent/s.
6. Under Apex One (Mac) Settings select Agent Self-Protection
Select > Protect files used by the agent
25 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Configuring Endpoint Sensor Settings
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Select the Product: Apex One (Mac)
4. Create or select the policy created.
5. On targets select Manage Targets and select target Apex One (Mac) agent/s.
6. Under Apex One (Mac) Settings select Enable Endpoint Sensor
7. Enable event recording
8. Advanced Settings > Send a subset of log data to perform preliminary investigations
9. Upload Frequency:
10. Enable Additional hash types: SHA-256 & MD5
26 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Configuring Real Time Scan Settings
1. On the Apex Central, log on to the Management Console.
2. Go to Policies > Policy Management.
3. Select the Product: Apex One (Mac)
4. Create or select the policy created.
5. On targets select Manage Targets and select target Apex One (Mac) agent/s.
6. Under Apex One (Mac) Settings select Real Time Scan Settings
7. Target Tab > File to Scan > Scan files being created/modified/executed
8. Under Scan Settings >Enabled the following:
a. Scan compressed files
9. Action Tab > Under Action
b. Use the same action for all security risk types
c. Select 1st Action: Clean | 2nd Action: Quarantine
10. Enable “Display a notification message on the endpoint when virus/malware is detected.”
27 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
a. Use the same action for all security risk types
b. Select 1st Action: Clean | 2nd Action: Quarantine
All Types
1st Action : Clean
2ndst Action : Quarantine
Display a notification message on the endpoint
when virus/malware is detected.
28 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
Prevention Recommendation
Windows Platform
Disabling System Restore
On Windows operating systems, System Restore is a feature that restores your computer to a point where it is
working fine. System Restore uses the last restore point made as its reference.
The AutoRun technology is a Windows® feature Microsoft introduced in Windows 95. It allows Windows
Explorer to automatically launch programs from inserted storage drives and other media. Its command is
rooted into the applications and can’t be edited by users.
The AUTORUN.INF text file, used for both the AutoRun and AutoPlay features, is placed in the root
directory of a volume or storage drive to launch specific applications, such as installation of files.
Cybercriminals abuse this technology by using worms that propagate through physical, removable, and
network drives and by leaving a file named AUTORUN.INF. This file is used to automatically execute
malware each time the infected drive is accessed.
The AutoPlay feature was updated in Windows 7 to address this issue by removing the ability to automatically
launch programs from non-optical media such as USB drives.
To disable Autorun:
1. Click Start then Run.
2. Type “GPEDIT.MSC” then press Enter.
3. Go to Local Computer Policy | Administrative Template | System.
4. On the right pane, double-click Turn off Autoplay.
5. When you are in the properties dialog box, click enabled.
6. Choose All drives from the drop-down list.
7. Click OK.
References:
29 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)
https://support.microsoft.com/en-us/help/967715/how-to-disable-the-autorun-functionality-in-
windows
https://technet.microsoft.com/en-us/library/cc731387(WS.10).aspx
https://support.microsoft.com/en-ph/kb/967715
The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates
and common security misconfigurations.
MacOS Platform
Keeping your Mac up to Date
How to : https://support.apple.com/en-mk/guide/mac-help/mchlpx1065/mac
Others
Educate users not to click on the links they do not trust
Do not open suspicious links or files especially from instant messengers, emails from unidentified users and
from pop-up windows.
You can utilize Trend Micro Phish Insight: https://phishinsight.trendmicro.com/en/
30 | Malware Best Practice Guide – Apex One as a Service /Apex Central /Apex One ( Mac)