Lab Guide
Lab Guide
User Protection
Lab Guide
Trend Micro, the Trend Micro t-ball logo, InterScan, VirusWall, ScanMail, ServerProtect,
and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated.
All other product or company names may be trademarks or registered trademarks of
their owners.
Portions of this manual have been reprinted with permission from other Trend Micro
documents. The names of companies, products, people, characters, and/or data
mentioned herein are fictitious and are in no way intended to represent any real
individual, company, product, or event, unless otherwise noted. Information in this
document is subject to change without notice.
This first lab introduces participants to the virtual lab environment used to complete the hands-on
exercises in this Apex One as a Service training course.
The classroom lab environment is delivered as a virtual application through Trend Micro Product Cloud
and will be accessed from a Web browser on your computer. Google Chrome is the preferred browser for
this environment, though other browsers may work if the appropriate plug-ins are enabled and working
properly.
Network Settings
The details and login credentials for each virtual machine in the classroom environment are listed here.
Always log into Windows as the local administrator. Logging in as a domain administrator will display a
different desktop and certain exercise files may not be available.
Note: If you did not receive the email message with the link, you may not have been correctly
registered for the class. Please advise the instructor immediately.
3 Hover your mouse over the computer icon on the right side of the page and click Go To Lab
Detail.
5 Hover your mouse over one of the virtual machines, and click Remote Control to enter that
virtual machine.
7 To log into the virtual machine, click on the toolbar to send a CTRL+ALT+DEL command
tothe virtual machine. Log in with the appropriate details.
• User name: Administrator
• Password: trendmicro
9 To fit the virtual machine window to the display, click on the toolbar.
Note: The connection icon on the toolbar will indicate if the network connection is adequate to run
the lab environment. Green bars should be displayed.
Once you are comfortable with navigating around the Product Cloud environment, proceed to Lab
In this lab, participants will initialize their Apex One as a Service account and prepare the Apex One and
Apex Central servers.
Note: Verify that the keyboard language is set correctly for your locale. See the section Changing
Languages Within Virtual Machines at the end of this lab for more details on changing the default
keyboard language within the virtual machine.
3 If an Enable Network Discovery message is displayed when logging into ANY client virtual
machine, click Yes.
4 In the Chrome Web browser, launch the Apex Central as a Service Web Management console
by typing the following URL:
https://manage.trendmicro.com/
6 A security alert suggesting you enable two-factor authentication is presented. Click Skip for now.
I accept the risks.
8 Select your Data Center Region, Language and Time Zone and click Next.
10 Once the preparation operations are completed, a Quick Start Guide is displayed. Click Close.
12 An email confirmation message is delivered to the email address you used to register your
account. The link to access the Apex Central as a Service Web Management console is also
contained in this message, should you require it in later labs.
If your preferred language is not being used, double-click the Change Language shortcut on the desktop.
Click Add a language and make your selection of keyboard languages. Move your new choice of language
to the top of the list using Move Up.
Reboot the computer. Once you log back in, your selected language which should be displayed in the
system tray.
Note: You will need to perform these steps on each virtual machine in the environment.
Alternately, a text file on the desktop called Copy and Paste.txtcontains entries that can be copied into
any requested fields
In this lab, participants will integrate Active Directory with their instance of Apex One as a Service.
7 In Windows Explorer, navigate to the C:\Tempfolder and extract the files from the
Apex_Central_ADSyncAgent_xxxx.zipfile C:\Temp.
Note: If you did not extract the files into C:\Temp, navigate to the folder where the decompressed files
reside and run the command.
Note: It may take a moment for the synchronization icon to be displayed. It the icon does not
appear after a few minutes, try refreshing the Web page.
11 Click Save
In this lab, participants will install Security Agents on endpoint computers in the virtual lab environment.
Note: The package that is downloaded is customized for the instance of Apex One as a Service on
which it was created.
6 Once the setup is complete, click Finish the close the wizard.
7 After a moment, the Apex One icon will be displayed in the system tray to indicate it is installed.
3 Still in the Apex Central Web Management console, click Directories > Product Servers.
4 Click the Apex One as a Service link to access the Apex One Web Management console
throughsingle sign on.
In this lab, participants will configure and deploy an Apex One policy though Apex Central.
3 Click Agents > Global Agent Settings. On the Network tab, set the Polling Interval value to 5
minutes and click Save.
Agents will now query the Apex One Server for updates every 5 minutes.
2 In the Product list, select Apex One Security Agent. To create a policy for this product, click
Create or Create one now.
4 Type a name for the policy, for example, Default Agent Policy.
5 Click to enable Filter by Criteria and click Set Filter.
6 This new default policy must be deployed to all Windows 10 computers in the virtual
environment. Click to enable Operating systems and start to type Windows 10. The list will filter as
you type and when Windows 10 is displayed, click to select. Click Save.
8 Click Deploy.
10 While waiting for the policy to deploy, click the number 2 under the Pending column. This will run
a query to list the two endpoints that were identified through the filtering operation. Close the
tab when you are done.
11 Once applied to the target endpoints, the policy will display with a status of Deployed.
3 When prompted, type the unload password that you entered when the Default Agent Policy was
configured, for example, Pa$$w0rd.
4 The Security Agent is unloaded from memory and in a moment, the Security Agent icon will
disappear from the system tray in the lower right-hand corner of the Windows screen.
5 To restart the Security Agent on CLIENT-02, click Start > Trend Micro Apex One Security Agent >
Security Agent.
In this lab, participants will create an Update Agent to distribute updates within the classroom
environment.
3 The policy template window is displayed. Type a name for the policy, for example, Update
Agent Policy.
4 Click to enable Specify Target and click Select.
6 In the left-hand pane of the policy template window, click Update Agent. In the right-hand frame,
click to select the components to be distributed by the Update Agent.
Note: Policy settings are not cumulative. Since CLIENT-03 is receiving a new policy, the Unload and
Unload and the Uninstallation password policy items must be added to the new policy.
8 The Policy will be listed as Pending while it awaits deployment to CLIENT-03. It can take several
minutes for the policy to deploy, based on the polling interval. Click Refresh at the top of the
policy list to recheck the status.
Note: CLIENT-03 was previously assigned the Default Agent Policy as it matched the attributes of the
filtered policy. Now that CLIENT-03 is specified in this new policy, the Update Agent policy takes
priority.
• IPv4: From 192.168.4.2to 192.168.4.2 (only CLIENT-01 will use this Update Agent)
• Update Source: Select CLIENT-03 from the Update Agent list
Click Save.
4 The Customized Update Source list is updated. Click Notify All Agents.
Note: Note that the External Source is listed as the /activeupdatedirectory on the Update Agent
computer.
4 Scroll towards the bottom of the log file to locate the entries for the latest update, and note that
the server.ini file is now being retrieved from \activeupdate directory on the CLIENT-03 computer
(the Update Agent)
In this lab, participants will enable malware scanning and sample malware will be accessed to trigger the
protection.
4 In the policy category list in the left-hand pane, click the Web Reputation category and on the
Internal Agents tab, disable Web reputation for Windows desktop platforms.
Note: The Web site you will access to download a malware sample is blocked by the Apex One Web
reputation protection. The protection is disabled to allow the download of a sample file from the
www.eicar.orgWeb site.
5 Click Deploy.
6 Once the policy is listed as Deployed, switch to the VM-CLIENT-02 virtual machine.
8 Click the Connection Status icon and note that Real-time Scan is enabled.
Review the details of the logged event and click Close. Close the Threat/Violations Found
notification window as well.
Note: Even though the malware file was not saved to the computer by clicking Save, the browser still
cached the malware download and triggered the real-time scan.
5 In the lab environment, switch to the VM-DC2016 virtual machine and return to the Apex Central
Web Management console.
6 Click Detections > Logs > Log Query. Select Virus/Malware from the first drop-down list and Last
24 Hours from the third drop-down list and click Search.
Note: It may take a few minutes for the Security Agent to forward its logs. If the log entry does
not display, try again in a couple of minutes.
Note: It may take a few minutes for the Security Agent to forward its logs. If the log entry does
not display, try again in a couple of minutes.
In this lab, participants will access an unknown application will be accessed to trigger Malicious Behavior
Detection.
4 In the lab environment, switch to the VM-CLIENT-02 virtual image. Access the sample detection
Web site by clicking the Detections bookmark in the browser or typing the following URL:
http://detection.trend.local
5 Click the suspicious link and save the file to the desktop.
8 Since the program was not allowed within the defined timeout, a second notification will appear
in a moment displaying that the threat was blocked through Malicious Behavior Detection.
10 Click Close once you have examined the details of the detection. Close the Threats/Violations
Found alert.
11 In the lab environment, switch to the VM-DC2016 virtual machine. In the Apex Central Web
Management console, run a log query to locate any entries related to the behavior monitoring
event.
Note: It may take up to an hour for the Security Agent to forward its Behavior Monitoring logs to the
Apex One Server. If the log entry does not display right away, try again later.
In this lab, participants will enable Predictive Machine Learning and sample malware will be accessed to
trigger protection.
4 Switch to the VM-CLIENT-02 image and return to the Detections demo site.
5 Click trendx_detect to download a malware sample.
9 Click Close in the Logs window. Close the Threats/Violations Found alert.
10 You may be prompted to restart the endpoint to complete the cleanup of the ransomware file.
If prompted, restart the server.
Note: It make take a few minutes for the log event to display.
In this lab, participants will configure Web Reputation and sample Web sites will be accessed.
3 In the policy category list in the left-hand pane, click Web Reputation.
4 On the Internal Agents tab, click to re-enable Web Reputation for Windows desktop platforms
andset the Security Level to Medium and click Deploy.
8 In Windows Explorer, navigate to the following folder and locate the OfcUrlf.logfile:
C:\program Files (x86)\Trend Micro\Security Agent\Misc
9 Open the file in Notepad and note the details for the blocked websites.
10 In the Web browser, clear the browsing history and close the browser.
3 In the Web Reputation category, ensure that Block pages containing malicious scripts is enabled.
Since these settings were already enabled, there is no need to redeploy the policy. Click Cancel to
close the policy window.
5 Click the number link next to Malicious URLs (this number may vary) to display the log entries for
these pages accesses. Click Close once you have noted the details. Close the Threats/Violations
Found alert.
Note: It may take a few minutes for the Security Agent to forward its logs. If the log entry does
not display, try again in a couple of minutes.
In this lab, participants will create a new firewall policy and profile to block Internet connections from an
endpoint computer.
3 Since this service is enabled by default, there is no need to redeploy the policy. Click Cancel.
2 Security Agent are notified with the new settings. Click Back.
3 Refresh the Web console page, then click Agents > Firewall > Policies. The list of default firewall
policies is displayed.
5 In the Exception pane, click Add and create an exception to block Web traffic with the following
details.
• Name: Block HTTP and HTTPS
• Application: All applications
• Action: Deny network traffic
• Direction: Inbound and Outbound enabled
• Protocol: TCP
• Specific Ports: 80,443
• IP address(es): All IP addresses
Click Save.
A banner is displayed in the console advising you that the Security Agents are being notified of
the new settings. On the next Polling operation, the Security Agent will received details of the
firewall policy.
Note: It may take a few minutes for the firewall to enable on the client computer. Click Update in
the Agent Console to accelerate the update process.
Note: The Command Prompt shortcut on the toolbar launches with administrator permissions. If
launching Command Prompt from the Windows menu, right-mouse click the item and click More >
Run as administrator.
5 Type the following command to generate a dump file of the firewall rules in effect on this
endpoint computer:
tmpfw dump
6 In Windows Explorer, locate and open the resulting dump file called !PfwDump.txtin the
following folder:
C:\Program Files (x86)\Trend Micro\Security Agent
7 Open the file in Notepad. Locate the entries for the exceptions to block ports 80 and 443.
9 Click the number next to Firewall Violations or Network Viruses to view logging details regarding
the firewall violation. Click Close.
5 After a few minutes, return to the VM-CLIENT-02 virtual machine and in the Agent console,
confirm that the All Access policy is back in use.
Note: You can click Update to trigger Agent polling to accelerate the removal of the Exercise Firewall
Policy.
In this lab, participants will enable Apex One Application Control to lockdown the inventory of
applications on an endpoint computer and block any unauthorized applications from running.
Note: If Application Control does not display as enabled (with the green icon), click Update in the
Security Agent console to force a refresh. The inventory process will take a several minutes to
complete on the endpoint computer.
3 Open the Lab Files folder on the desktop. Copy the WinMD5.exefile from this folder to the
C:\Tempfolder on the CLIENT-02 computer.
4 Once the file has been copied, double-click file and click Run to execute the application.
5 A block message is displayed.
7 In the User-Defined Rules section, click the All user accounts rule. The policy criteria are
displayed in the Available criteria column.
9 Scroll down and click Deploy. Wait until the new policy is deployed before proceeding to the next
exercise.
In this lab, participants will enable Apex One Vulnerability Protection to protect an endpoint computer
from operating system exploits.
4 Click Policies > Policy Management and edit the Default Agent Policy.
5 In the policy category list in the left-hand pane, click the Web Reputation category and on the
Internal Agents tab, disable Web reputation for Windows desktop platforms.
Note: The Web Reputation protection enabled in the policy will block the eicar web site used in this
exercise before the Vulnerability Protection kicks in. Disabling Web Reputation will allow the
intrusion prevention rules to block the sample site.
7 In the Search field, type eicarand press <enter>. The Restrict Download of EICAR Test File Over
HTTP rule is displayed. Note that this rule is disabled in the Recommended profile. This rule will
allow you to test that the intrusion prevention rules are being enforced on the endpoint
computer. Change the Status for this rule to User-Defined (Enabled).
9 Click Deploy and wait until the policy is deployed before continuing.
2 In a Web browser on the CLIENT-02 computer, click the EICAR bookmark, or type the following
URL to download the EICAR test file:
http://www.eicar.org/download/eicar.com
4 Return to the Apex Central Web Management console and run a log query to locate the entry
related to the Intrusion Prevention Rules being triggered.
In this lab, participants will configure Apex One Data Loss Prevention to block files containing specific
data from leaving the endpoint computer.
5 In the Keywords section, add the following words and assign the listed scores. Click Add after
each one to append the word to the list.
Keyword Score Case Sensitive
contract 3 Disabled
Taylor 2 Disabled
confidential 5 Disabled
Click Save.
7 A success message is displayed. Click Close.
8 To simplify the location of custom lists, the prefix of Managed will be added to the name.
3 Complete the Properties section in the Data Loss Prevention Templates windows as follows:
• Name: Confidential Contracts
• Available data identifiers: search for Exercise keywords. Click to select it and click >> to add
it to the Selected data identifiers list.
Click Add to Template, then Save.
5 Verify that the new Confidential Contracts template has been added to the list of available
templates.
3 On the Browse tab, locate and select CLIENT-02 in the Product Directory and click Add Selected
Targets, then OK.
4 Click Apex One DLP in the left-hand pane. On the Internal Agents tab, click Enable Data Loss
Prevention and click Add for a new rule.
6 Click the Channel tab and enable the channel(s) that will be monitored by the policy. Click to
enable all the channels listed.
7 Click the Action tab to select the operations that will be triggered by the policy. Click to select the
Block action along with Notify the agents user, Record data and User Justification. Click Save.
10 In the lab environment, switch to the VM-CLIENT-02 virtual machine and verify that Data Loss
Prevention is deployed from the Security Agent console on the client computer.