SlideShare a Scribd company logo
1 of 79
Download to read offline
Endpoint Security
By
Eng. Ahmed Hashem El Fiky
Network Security Engineer
Malware Analyst
Agenda
• Endpoint Categories.
• Endpoint Categories Features.
• Endpoint Categories Vendors.
• TrendMicro OfficeScan.
• Why TrendMicro OfficeScan?
• What are System Requirements?
• Device Location in your Business
• Initial Installation and configuration
• Add Features
• Testing
Endpoint Categories
• Endpoint Antivirus .
• Endpoint Security.
(Endpoint Detection & Response (EDR) Software or Endpoint Management Software)
Endpoint Antivirus Features
• Anti-Malware.
• Protection Against Browser Exploits.
• Anti-Virus.
• Anti-Trojan.
• Anti-Spyware.
• Anti-Worm.
• Anti-Rootkit.
• Virtualization Support
• Anti-Phishing.
• Secure Network.
• Email Protection
• Automatic Virus Updates.
• Automatic Program Updates.
• Heuristic Scanner.
• Remote Management.
Reference1: https://www.techradar.com/news/best-business-antivirus-8-top-paid-security-tools-for-small-businesses
Reference2: https://antivirus.bunifu.co.ke/important-features-to-look-for-in-an-antivirus/
Endpoint Antivirus Top Vendors 2018
• Avast Business Antivirus Pro
• Symantec Endpoint Protection 14
• Bitdefender GravityZone Business Security
• Avira Antivirus for Endpoint
• Kaspersky Endpoint Security Cloud 4.0
• Webroot SecureAnywhere Business Endpoint Protection
• F-Secure Client Security Standard
• Sophos Endpoint Protection Advanced
Reference: https://www.techradar.com/news/best-business-antivirus-8-top-paid-security-tools-for-small-businesses
Endpoint Security Features
• Firewall
• Antivirus solution
• Internet Security
• Encryption
• Device Firewalls
• Mobile Device Management
• Mobile Security Solutions
• Intrusion Detection Techniques
• Application Controls.
Reference: https://blog.comodo.com/endpoint-security/ten-best-features-of-effective-endpoint-security/
Endpoint Security Top Vendors 2018
• Carbon Black
• CrowdStrike
• FireEye
• Kaspersky Lab
• Symantec
• Trend Micro
Reference: https://solutionsreview.com/endpoint-security/endpoint-security-vendors-to-watch-2018/
Summary
Reference: http://www.asteknetsol.com/difference-between-endpoint-security-and-antivirus/
Why TrendMicro OfficeScan (EndPoint Security)?
• Protection Points
• Physical endpoints
• Virtualized endpoints (add-on)
• Windows PCs and Servers
• Mac computers
• Point of Sale (POS) and ATM endpoints
Reference: https://www.trendmicro.com/en_us/business/products/user-protection/sps/endpoint/officescan.html
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Threat Protection
• High-fidelity machine learning (pre-execution and runtime)
• Behavioral analysis (against scripts, injection, ransomware, memory and browser attacks)
• File reputation
• Variant protection
• Census check
• Web reputation
• Exploit prevention (host firewall, exploit protection)
• Command and control (C&C) blocking
• Data loss prevention (DLP module)
• Device control
• Good file check
• Sandbox and breach detection integration
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Also You can have it all
• Advanced malware and ransomware protection
• Connected threat defense
• Centralized visibility and control
• Mobile security integration
• Available on- premises or as a service
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Maximum XGen™ security
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Reduce user impact and management costs.
• you to deploy and manage OfficeScan from our cloud-based service and offers
feature parity with the on-premises option.
• Lightweight and optimized security uses the right detection technique at the right
time to ensure minimal impact on devices and networks.
• Comprehensive central view of endpoint status lets you quickly get visibility to
security risks.
• Automatic sharing of threat intelligence across security layers enables protection
from emerging threats across the whole organization.
• Enable off-premises compliance and protection with the Edge relay that enables
employees to work outside the corporate network and still connect to OfficeScan
without a VPN.
• Customizable dashboards to fit different administration responsibilities.
• 24x7 support means that if a problem arises, Trend Micro is there to resolve it
quickly.
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Proven Security Partner
• Over 25 years of security innovation.
• Protects over 155 million endpoints.
• Trusted by 45 of the top 50 global corporations.
• Trend Micro placed Highest and Furthest in the Leaders quadrant for its
Ability to Execute and Completeness of Vision in the 2017 Gartner Magic
Quadrant for Endpoint Protection Platforms.
Why TrendMicro OfficeScan (EndPoint Security)?
Cont..
• Customize your endpoint protection
• Data Loss Prevention (DLP) Module
• Security for Mac Module
• Virtual Desktop Infrastructure (VDI) Module
• Endpoint Encryption Option
• Vulnerability Protection Option
• Endpoint Application Control Option
• Endpoint Sensor Option
• Trend Micro™ Control Manager™ Module
TrendMicro OfficeScan System Requirements
• Server Requirements.
• OfficeScan Target Server
• OfficeScan Edge Relay Server
• Agent Requirements.
Minimum OfficeScan Target Server OS
• Windows HPC Server 2008 and HPC Server 2008 R2 (x64)
• Windows MultiPoint Server 2010 (x64) and 2012 (x64)
• Windows Server 2012 and 2012 R2 (x64) Editions
• Windows MultiPoint Server 2012 (x64) Editions
• Windows Storage Server 2012 (x64) Editions
• Windows Server 2016 (x64) Editions
Minimum OfficeScan Target Server Platform
Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better
Memory:
1 GB minimum (2 GB recommended) with at least 500 MB
exclusively for OfficeScan (on Windows 2008 family)
2 GB minimum with at least 500 MB exclusively for
OfficeScan (on Windows 2010/2011/2012/2016 family)
Disk Space: 6.5 GB minimum, 7 GB minimum (using remote install)
Minimum OfficeScan Edge Relay Server Platform
Processor: 2 GHz Intel Core 2 Duo (2 CPU cores) or better
Memory: 4 GB minimum
Disk Space: 50 GB minimum
Operation System: Windows Server 2012 R2
Network Card: 1.2 network cards connect
1. One for intranet connection to OfficeScan Server
2. One for external connection to off-premises OfficeScan agents
2.1 network card configuration to use different ports for intranet and
internet connections
Database: 1.SQL Server 2008 R2 Express (or later)
2.SQL Server 2008 R2 (or later)
Minimum OfficeScan Agent OS
•Windows XP (SP3) (x86) Editions
•Windows XP (SP2) (x64) (Professional Edition)
•Windows 7 (with/without SP1) (x86/x64) Editions
•Windows 8 and 8.1 (x86/x64) Editions
•Windows 10 (32-bit and 64-bit)
•Windows 10 IoT Embedded
•Windows Server 2003 (SP2) and 2003 R2 (x86/x64) Editions
•Windows Compute Cluster Server 2003 (Active/Passive)
•Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions
•Windows Server 2008 (SP2) (x86/x64) and 2008 R2 (SP1) (x64) Editions
•Windows Storage Server 2008 (SP2) (x86/x64) and Storage Server 2008 R2 (x64) Editions
•Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64) Editions
Minimum OfficeScan Agent OS Cont..
•Windows Server 2008/2008 R2 Failover Clusters (Active/Passive)
•Windows MultiPoint Server 2010 and 2011 (x64)
•Windows Server 2012 and 2012 R2 (x64) Editions
•Windows Storage Server 2012 and 2012 R2 (x64) Editions
•Windows MultiPoint Server 2012 (x64) Editions
•Windows Server 2012 Failover Clusters (x64)
•Windows Server 2016 (x64) Editions
•Windows XP Embedded Standard (SP1/SP2/SP3) (x86)
•Windows Embedded Standard 2009 (x86)
•Windows Embedded POSReady 2009 (x86), Embedded POSReady 7 (x86/x64)
•Windows 7 Embedded (x86/x64) (SP1)
•Windows 8 and 8.1 Embedded (x86/x64) Editions
Minimum OfficeScan Agent Platform
• Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1, 10 family)
• 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Vista, Windows
Embedded POS, Windows 2008 (x86) family)
• 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 (x64),
Windows 2016 family)
• Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for
OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family)
• 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan
(Windows 2008, 2010, 2011, 2012 family)
• 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows
Vista family)
• 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows
7 (x86), 8 (x86), 8.1 (x86), Windows Embedded POSReady 7 family)
• 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows
7 (x64), 8 (x64), 8.1 (x64) family)
• Disk Space: 650 MB minimum
Location of the OfficeScan Target Server
• you can position a firewall between the OfficeScan server and its
agents.
• position both the server and all agents behind a single network
firewall.
• Note:
• If there is a firewall between the server and its agents, configure the firewall
to allow traffic between the agent and server listening ports.
Installation of OfficeScan Target Server
• Installing IIS web Server.
• https://docs.microsoft.com/en-us/iis/get-started/whats-new-in-iis-8/installing-iis-
8-on-windows-server-2012
• Installing OfficeScan XG.
• Download OfficeScan XG and Product patch from TrendMicro Download Center.
• Register Trial Key From TrendMicro.
Download OfficeScan XG
• http://downloadcenter.trendmicro.com/
Download OfficeScan XG Product
Download OfficeScan XG Product Patch
Reference: https://success.trendmicro.com/solution/1106091-types-of-fixes
Download OfficeScan XG Product Patch
Registration Key and Activation Codes
• During installation, specify the Activation Codes for the following services:
• Antivirus
• Damage Cleanup Services™ (optional)
• Web Reputation and Anti-spyware (optional)
• Use the Registration Key that came with the product to obtain Activation
Codes
http://olr.trendmicro.com
After registering the product, Trend Micro sends the Activation Codes.
TrendMicro OfficeScan Installation
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
• OfficeScan Agent Deployment:
• Conventional Scan Method
• agent stores all OfficeScan components on the agent endpoint and scans all files locally.
• Smart Scan Method
• agent first scans for security risks locally. If the agent cannot determine the risk of the file
during the scan, the agent connects to a Smart Protection Server.
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
TrendMicro OfficeScan Installation Cont..
• Install OfficeScan Product Patch XG.
TrendMicro OfficeScan Management
• Now we can access web console to manage.
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Installation Cont..
• Configure OfficeScan
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
• Create Package to install OfficeScan Agent.
TrendMicro OfficeScan Management Cont..
TrendMicro OfficeScan Management Cont..
• Share OfficeScan Agent to Installing.
TrendMicro OfficeScan Agent
TrendMicro OfficeScan Agent Installation
TrendMicro OfficeScan Agent Installation
TrendMicro OfficeScan Agent Management
Endpoint Security
Endpoint Security

More Related Content

What's hot

Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOARDNIF
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptxAjit Wadhawan
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
 

What's hot (20)

SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Similar to Endpoint Security

ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT
 
Design Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System ArchitectureDesign Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System ArchitectureInductive Automation
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350Binod Kumar
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Netgear Italia
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product OvervieweScan
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Netgear Italia
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with SparrowJason Sohn
 
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Netgear Italia
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes MainstreamIngram Micro Cloud
 
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Mike Martin
 
azure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againazure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againITProceed
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with AzureGlobal Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with AzureVinoth Rajagopalan
 

Similar to Endpoint Security (20)

Window server editions
Window server editionsWindow server editions
Window server editions
 
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product Datasheet
 
Design Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System ArchitectureDesign Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System Architecture
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product Overview
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 
MBESDatasheet
MBESDatasheetMBESDatasheet
MBESDatasheet
 
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...Webinar NETGEAR -  ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
Webinar NETGEAR - ACRONIS e NETGEAR: Demo di soluzione DR per l'Azienda - pa...
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
 
azure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againazure track -03- it pros meet azure - again
azure track -03- it pros meet azure - again
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with AzureGlobal Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
 

More from Ahmed Hashem El Fiky

More from Ahmed Hashem El Fiky (7)

11 professional certificates
11 professional certificates11 professional certificates
11 professional certificates
 
FortiNet NSE 4 certificate
FortiNet NSE 4 certificateFortiNet NSE 4 certificate
FortiNet NSE 4 certificate
 
FortiNet NSE 2 certificate
FortiNet NSE 2 certificateFortiNet NSE 2 certificate
FortiNet NSE 2 certificate
 
FortiNet NSE 1 Certification
FortiNet NSE 1 CertificationFortiNet NSE 1 Certification
FortiNet NSE 1 Certification
 
Nexthink basics certification
Nexthink basics certificationNexthink basics certification
Nexthink basics certification
 
Build Your OS Part1
Build Your OS Part1Build Your OS Part1
Build Your OS Part1
 
FortiWLC
FortiWLC FortiWLC
FortiWLC
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

Endpoint Security

  • 1. Endpoint Security By Eng. Ahmed Hashem El Fiky Network Security Engineer Malware Analyst
  • 2. Agenda • Endpoint Categories. • Endpoint Categories Features. • Endpoint Categories Vendors. • TrendMicro OfficeScan. • Why TrendMicro OfficeScan? • What are System Requirements? • Device Location in your Business • Initial Installation and configuration • Add Features • Testing
  • 3. Endpoint Categories • Endpoint Antivirus . • Endpoint Security. (Endpoint Detection & Response (EDR) Software or Endpoint Management Software)
  • 4. Endpoint Antivirus Features • Anti-Malware. • Protection Against Browser Exploits. • Anti-Virus. • Anti-Trojan. • Anti-Spyware. • Anti-Worm. • Anti-Rootkit. • Virtualization Support • Anti-Phishing. • Secure Network. • Email Protection • Automatic Virus Updates. • Automatic Program Updates. • Heuristic Scanner. • Remote Management. Reference1: https://www.techradar.com/news/best-business-antivirus-8-top-paid-security-tools-for-small-businesses Reference2: https://antivirus.bunifu.co.ke/important-features-to-look-for-in-an-antivirus/
  • 5. Endpoint Antivirus Top Vendors 2018 • Avast Business Antivirus Pro • Symantec Endpoint Protection 14 • Bitdefender GravityZone Business Security • Avira Antivirus for Endpoint • Kaspersky Endpoint Security Cloud 4.0 • Webroot SecureAnywhere Business Endpoint Protection • F-Secure Client Security Standard • Sophos Endpoint Protection Advanced Reference: https://www.techradar.com/news/best-business-antivirus-8-top-paid-security-tools-for-small-businesses
  • 6. Endpoint Security Features • Firewall • Antivirus solution • Internet Security • Encryption • Device Firewalls • Mobile Device Management • Mobile Security Solutions • Intrusion Detection Techniques • Application Controls. Reference: https://blog.comodo.com/endpoint-security/ten-best-features-of-effective-endpoint-security/
  • 7. Endpoint Security Top Vendors 2018 • Carbon Black • CrowdStrike • FireEye • Kaspersky Lab • Symantec • Trend Micro Reference: https://solutionsreview.com/endpoint-security/endpoint-security-vendors-to-watch-2018/
  • 9. Why TrendMicro OfficeScan (EndPoint Security)? • Protection Points • Physical endpoints • Virtualized endpoints (add-on) • Windows PCs and Servers • Mac computers • Point of Sale (POS) and ATM endpoints Reference: https://www.trendmicro.com/en_us/business/products/user-protection/sps/endpoint/officescan.html
  • 10. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Threat Protection • High-fidelity machine learning (pre-execution and runtime) • Behavioral analysis (against scripts, injection, ransomware, memory and browser attacks) • File reputation • Variant protection • Census check • Web reputation • Exploit prevention (host firewall, exploit protection) • Command and control (C&C) blocking • Data loss prevention (DLP module) • Device control • Good file check • Sandbox and breach detection integration
  • 11. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Also You can have it all • Advanced malware and ransomware protection • Connected threat defense • Centralized visibility and control • Mobile security integration • Available on- premises or as a service
  • 12. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Maximum XGen™ security
  • 13. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Reduce user impact and management costs. • you to deploy and manage OfficeScan from our cloud-based service and offers feature parity with the on-premises option. • Lightweight and optimized security uses the right detection technique at the right time to ensure minimal impact on devices and networks. • Comprehensive central view of endpoint status lets you quickly get visibility to security risks. • Automatic sharing of threat intelligence across security layers enables protection from emerging threats across the whole organization. • Enable off-premises compliance and protection with the Edge relay that enables employees to work outside the corporate network and still connect to OfficeScan without a VPN. • Customizable dashboards to fit different administration responsibilities. • 24x7 support means that if a problem arises, Trend Micro is there to resolve it quickly.
  • 14. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Proven Security Partner • Over 25 years of security innovation. • Protects over 155 million endpoints. • Trusted by 45 of the top 50 global corporations. • Trend Micro placed Highest and Furthest in the Leaders quadrant for its Ability to Execute and Completeness of Vision in the 2017 Gartner Magic Quadrant for Endpoint Protection Platforms.
  • 15. Why TrendMicro OfficeScan (EndPoint Security)? Cont.. • Customize your endpoint protection • Data Loss Prevention (DLP) Module • Security for Mac Module • Virtual Desktop Infrastructure (VDI) Module • Endpoint Encryption Option • Vulnerability Protection Option • Endpoint Application Control Option • Endpoint Sensor Option • Trend Micro™ Control Manager™ Module
  • 16. TrendMicro OfficeScan System Requirements • Server Requirements. • OfficeScan Target Server • OfficeScan Edge Relay Server • Agent Requirements.
  • 17. Minimum OfficeScan Target Server OS • Windows HPC Server 2008 and HPC Server 2008 R2 (x64) • Windows MultiPoint Server 2010 (x64) and 2012 (x64) • Windows Server 2012 and 2012 R2 (x64) Editions • Windows MultiPoint Server 2012 (x64) Editions • Windows Storage Server 2012 (x64) Editions • Windows Server 2016 (x64) Editions
  • 18. Minimum OfficeScan Target Server Platform Processor: 1.86 GHz Intel Core 2 Duo (2 CPU cores) or better Memory: 1 GB minimum (2 GB recommended) with at least 500 MB exclusively for OfficeScan (on Windows 2008 family) 2 GB minimum with at least 500 MB exclusively for OfficeScan (on Windows 2010/2011/2012/2016 family) Disk Space: 6.5 GB minimum, 7 GB minimum (using remote install)
  • 19. Minimum OfficeScan Edge Relay Server Platform Processor: 2 GHz Intel Core 2 Duo (2 CPU cores) or better Memory: 4 GB minimum Disk Space: 50 GB minimum Operation System: Windows Server 2012 R2 Network Card: 1.2 network cards connect 1. One for intranet connection to OfficeScan Server 2. One for external connection to off-premises OfficeScan agents 2.1 network card configuration to use different ports for intranet and internet connections Database: 1.SQL Server 2008 R2 Express (or later) 2.SQL Server 2008 R2 (or later)
  • 20. Minimum OfficeScan Agent OS •Windows XP (SP3) (x86) Editions •Windows XP (SP2) (x64) (Professional Edition) •Windows 7 (with/without SP1) (x86/x64) Editions •Windows 8 and 8.1 (x86/x64) Editions •Windows 10 (32-bit and 64-bit) •Windows 10 IoT Embedded •Windows Server 2003 (SP2) and 2003 R2 (x86/x64) Editions •Windows Compute Cluster Server 2003 (Active/Passive) •Windows Storage Server 2003 (SP2), Storage Server 2003 R2 (SP2) (x86/x64) Editions •Windows Server 2008 (SP2) (x86/x64) and 2008 R2 (SP1) (x64) Editions •Windows Storage Server 2008 (SP2) (x86/x64) and Storage Server 2008 R2 (x64) Editions •Windows HPC Server 2008 and HPC Server 2008 R2 (x86/x64) Editions
  • 21. Minimum OfficeScan Agent OS Cont.. •Windows Server 2008/2008 R2 Failover Clusters (Active/Passive) •Windows MultiPoint Server 2010 and 2011 (x64) •Windows Server 2012 and 2012 R2 (x64) Editions •Windows Storage Server 2012 and 2012 R2 (x64) Editions •Windows MultiPoint Server 2012 (x64) Editions •Windows Server 2012 Failover Clusters (x64) •Windows Server 2016 (x64) Editions •Windows XP Embedded Standard (SP1/SP2/SP3) (x86) •Windows Embedded Standard 2009 (x86) •Windows Embedded POSReady 2009 (x86), Embedded POSReady 7 (x86/x64) •Windows 7 Embedded (x86/x64) (SP1) •Windows 8 and 8.1 Embedded (x86/x64) Editions
  • 22. Minimum OfficeScan Agent Platform • Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1, 10 family) • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Vista, Windows Embedded POS, Windows 2008 (x86) family) • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 (x64), Windows 2016 family) • Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family) • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 2008, 2010, 2011, 2012 family) • 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows Vista family) • 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x86), 8 (x86), 8.1 (x86), Windows Embedded POSReady 7 family) • 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for OfficeScan (Windows 7 (x64), 8 (x64), 8.1 (x64) family) • Disk Space: 650 MB minimum
  • 23. Location of the OfficeScan Target Server • you can position a firewall between the OfficeScan server and its agents. • position both the server and all agents behind a single network firewall. • Note: • If there is a firewall between the server and its agents, configure the firewall to allow traffic between the agent and server listening ports.
  • 24. Installation of OfficeScan Target Server • Installing IIS web Server. • https://docs.microsoft.com/en-us/iis/get-started/whats-new-in-iis-8/installing-iis- 8-on-windows-server-2012 • Installing OfficeScan XG. • Download OfficeScan XG and Product patch from TrendMicro Download Center. • Register Trial Key From TrendMicro.
  • 25. Download OfficeScan XG • http://downloadcenter.trendmicro.com/
  • 27. Download OfficeScan XG Product Patch Reference: https://success.trendmicro.com/solution/1106091-types-of-fixes
  • 28. Download OfficeScan XG Product Patch
  • 29. Registration Key and Activation Codes • During installation, specify the Activation Codes for the following services: • Antivirus • Damage Cleanup Services™ (optional) • Web Reputation and Anti-spyware (optional) • Use the Registration Key that came with the product to obtain Activation Codes http://olr.trendmicro.com After registering the product, Trend Micro sends the Activation Codes.
  • 41. TrendMicro OfficeScan Installation Cont.. • OfficeScan Agent Deployment: • Conventional Scan Method • agent stores all OfficeScan components on the agent endpoint and scans all files locally. • Smart Scan Method • agent first scans for security risks locally. If the agent cannot determine the risk of the file during the scan, the agent connects to a Smart Protection Server.
  • 56. TrendMicro OfficeScan Installation Cont.. • Install OfficeScan Product Patch XG.
  • 57. TrendMicro OfficeScan Management • Now we can access web console to manage.
  • 59. TrendMicro OfficeScan Installation Cont.. • Configure OfficeScan
  • 71. TrendMicro OfficeScan Management Cont.. • Create Package to install OfficeScan Agent.
  • 73. TrendMicro OfficeScan Management Cont.. • Share OfficeScan Agent to Installing.